Index_D


D

DACL (Discretionary Access Control List), See also Win32 API security overview

accessing ACEs in directly, 408–411

ACE order in, 400, 435

functions for, 395, 396, 397, 399

getting/setting in registry, 431

obtaining privilege information, 414–417, 417

overview of, 390, 414

setting properties, 401, 401

Daemen, Joan, 440

Data Encryption Standard. See DES

data entry errors. See avoiding

data formats/types, defining, 63–64

data formatter/deformatter classes, 36

data, ordering/parsing, 64

data ranges, 53–55, 55, 442

data streams, 286, 301, 442

database security. See Web data security

DBMS (Database Management System), 264, 442–443

DCOM Configuration Tool, See also Win32 API advanced security

authentication levels, 436–437

component options, 435

default options, 434–435

defined, 432

dialog box tabs, 432–433

impersonation levels, 433–434

overview of, 212

starting, 432

uses, 432

warning, 434

DCOM (Distributed Component Object Model) protocol, See also COM+; LAN security

calling components from unmanaged code, 217–219

COM interface attributes, 214–215, 217

creating managed COM interfaces, 216–217

defined, 213, 444

GUIDs and, 215

overview of, 212, 213

security risks, 301

DDOS (denial-of-service) attacks, See also Web server security

defined, 253–254, 444

OOB messages and, 254

performance counters and, 254–258, 257

debugger attribute in SoapHttpClientProtocol class, 306, 307

debugging, remote, enabling, 238–241, 239–240

declarative security, See also code access security

defined, 443

defining effectively, 92

implementing permissions, 136–137

managing AD access, 353–354

overview of, 9, 19, 87

using Permission View Tool, 83–87, 86–87

reasons to use, 72, 73, 83, 92–93

decryption. See cryptography techniques

default code groups, 119–120, 119–120

default database values, 273

default DCOM configuration options, 434–435

default policies, 140

Default Web Site Properties dialog box, 238–239, 239, 294–295, 295

Delegate impersonation level, 434

Deny() method, 97

Der Keiler Web sites, 26, 58, 260

DES (Data Encryption Standard)

cracking, 185–186

defined, 442

overview of, 36, 180

TripleDES, 185, 186

deserialization, 280–281, 443

digital certificates. See CA; CAs; certificates, digital

digital rights management (DRM), 278

Digital Signature Algorithm (DSA), 36, 185, 186, 443

digital signatures, 72–73, 99, 153

directory services. See AD

DiscoveryClientProtocol class, 308, 310–312

Discretionary Access Control List. See DACL

distributed applications

defined, 443–444

using principal/identity objects in, 81–83, 82

security problems, 13–14, 16

Web services security and, 302

domain controllers, calling via Win32 API, 346–353, 352

domain trust relationships, 345–346, See also AD

domains, 444

domains, application, 6, 160, See also AppDomain class

Dotfuscator tool, 156–159, 156–159

DRM (digital rights management), 278

DSA (Digital Signature Algorithm), 36, 185, 186, 443

DTD (document type definition), 63




.Net Development Security Solutions
.NET Development Security Solutions
ISBN: 0782142664
EAN: 2147483647
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net