Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Encryption
Figure 1-1: Encrypting and decrypting a secret message
Figure 1-2: SHA-1 hash digests
Figure 1-3: Private key encryption
Figure 1-4: Public key encryption and decryption
Chapter 2: Role-Based Authorization
Figure 2-1: Employees and roles
Figure 2-2: Buttons are hidden based on roles
Figure 2-3: Jane’s permissions
Chapter 3: Code-Access Security
Figure 3-1: An attempt to perform an action must pass through several security checks
Figure 3-2: Standard symbols representing each zone
Figure 3-3: The Opening Mail Attachment warning dialog box
Chapter 4: ASP.NET Authentication
Figure 4-1: Forms authentication
Chapter 5: Securing Web Applications
Figure 5-1: 13 hops to Yahoo
Figure 5-2: Intercepting TCP/IP packets
Figure 5-3: Trusted certificate authorities in Internet Explorer
Chapter 6: Application Attacks and How to Avoid Them
Figure 6-1: The user name and password fields injected by the attacker’s user name
Chapter 7: Validating Input
Figure 7-1: The error displayed by the
RegularExpressionValidator
control
Chapter 8: Handling Exceptions
Figure 8-1: View the event log on a user’s computer
Chapter 9: Testing for Attack- Resistant Code
Figure 9-1: An attacker’s blueprint of your application
Figure 9-2: The sample test page to be viewed by WebTester
Figure 9-3: Five steps to get a hacker’s view of your Web page
Figure 9-4: A hacker’s view of your ASP.NET-generated Web page
Chapter 10: Securing Your Application for Deployment
Figure 10-1: Elements of an X.509 certificate.
Chapter 11: Locking Down Windows, Internet Information Services, and .NET
Figure 11-1: The Microsoft Baseline Security Analyzer
Figure 11-2: The IIS Lockdown tool
Chapter 12: Securing Databases
Figure 12-1: Results of three identifier methods
Figure 12-2: Adding a user to a database
Figure 12-3: Securing VBA code in a Microsoft Access database
Figure 12-4: Turn on auditing in SQL Server Enterprise Manager
Chapter 13: Ten Steps to Designing a Secure Enterprise System
Figure 13-1: Secure Web application architecture 1
Figure 13-2: Secure Web application architecture 2
Figure 13-3: Secure intranet Web architecture
Figure 13-4: Secure client-server architecture
Figure 13-5: What is the right decision?
Figure 13-6: Give the user a chance to back out
Chapter 15: Threat Analysis Exercise
Figure 15-1: Employee management system Web design diagram for user logon scenario
Chapter 16: Future Trends
Figure 16-1: Press the button to flood the town below
Appendix A: Guide to the Code Samples
Figure A-1: The
frmLogin
form
Figure A-2: The
frmDashboard
form
Figure A-3: The
frmMyInfo
form
Figure A-4: The
frmAddNew
form
Figure A-5: The
frmRemoveUser
form
Figure A-6: The
frmManage
form
Figure A-7: The default.aspx Web form
Figure A-8: The login.aspx Web form
Figure A-9: Voila! The page finally opens
Figure A-10: Editing a profile
Figure A-11: Encryption Demo
Figure A-12: Changing the Passport environment to pre-production
Figure A-13: EmployeeDatabase data model
Previous page
Table of content
Next page
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Process Memory Addresses
Signaling Processes
Key Terms and Concepts
Creating a Shared Memory Segment
Thread Attributes
High-Speed Signal Propagation[c] Advanced Black Magic
Telegraphers Equations
Hierarchy of Regions
Effect of Inadequate Sampling Rate
Finished Core Specifications
Effect of Clock Receiver Thresholds
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Links to developerWorks
Variables
Collaborative Applications
Obtain the Current Roles Assigned to a User
Appendix A. Online Project Files and Sample Applications
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
The AJAX Control Toolkit
Built-in Application Services
Building AJAX Applications with ASP.NET
Sap Bw: a Step By Step Guide for Bw 2.0
Sales Analysis A Business Scenario
Creating an InfoSource for Transaction Data
Checking Data Quality
BW Statistics
Appendix D. Bibliography
Web Systems Design and Online Consumer Behavior
Chapter V Consumer Complaint Behavior in the Online Environment
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter XII Web Design and E-Commerce
Chapter XIII Shopping Agent Web Sites: A Comparative Shopping Environment
Chapter XIV Product Catalog and Shopping Cart Effective Design
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies