List of Sidebars


Chapter 1: Encryption

How Does a Hash Digest Work?
Export Restrictions on Encryption

Chapter 2: Role-Based Authorization

The Identity and Principal Objects
Searching Active Directory

Chapter 3: Code-Access Security

OS Security Restrictions Preempt Everything
The Luring Attack

Chapter 4: ASP.NET Authentication

Anonymous Requests

Chapter 5: Securing Web Applications

Is It a Bug, or an Attack from a Criminal Mastermind?
Global XML Architecture
Windows Management Instrumentation

Chapter 6: Application Attacks and How to Avoid Them

Buffer Overrun

Chapter 7: Validating Input

Web-Based Input Attacks and SSL

Chapter 8: Handling Exceptions

Try…Catch or On Error GoTo
Viewing the Event Log Remotely

Chapter 10: Securing Your Application for Deployment

Delay Signing—Securing Your Build Process

Chapter 14: Threats—Analyze, Prevent, Detect, and Respond

STRIDE—Categorizing Threats




Security for Microsoft Visual Basic  .NET
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net