|
earned trust, 148–149, See also validation
encryption. See cryptography techniques
errors, See also avoiding; crackers; security risks; troubleshooting
apparent communication errors, 258
in assemblies, resolving, 117–118, 117
fixing in IIS Lockdown Tool, 269–271, 269–270
logic, in database security, 265
reporting and handling, 64
in Win32 API
data structures and, 417
function failures, 416, 429
handling, 415, 416, 420–421
initializing SACL, 422
privilege change failures, 423
running SACL audits, 423–424, 424
trapping, 351
evidence, See also code access security
checking, 75–77
evidence-based security, 5
obtaining permissions via, 79–80, 80
obtaining by reflection, 103–106, 106
Publisher evidence, 99
ExistingMovies database, 267
eXtensible Access Control Markup Language (XACML), 320–321, 445
eXtensible Markup Language. See XML
external programs, accessing, 167–169
|