D_Index

for RuBoard
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

DACL (Dynamic Access Control List)   2nd   3rd   4th   5th   6th   7th   8th  
Data Encryption Standard (DES)  
data storage
       stacks   2nd  
database servers
       security mechanisms   2nd  
databases
       SQL server databases
               authentication   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
DCOM   2nd   3rd  
declarative security   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th  
default configurations   2nd  
defaults
       security policy   2nd   3rd   4th  
delay signed assemblies   2nd   3rd   4th   5th  
delay signing assemblies   2nd   3rd   4th   5th   6th   7th  
delegates
       semi-trusted applications   2nd  
delegation   2nd   3rd   4th   5th   6th   7th  
deleting
       code groups   2nd  
       Isolated Storage   2nd   3rd   4th   5th   6th   7th   8th  
denial-of-service attacks   2nd   3rd  
denial-of-service vulnerabilities   2nd  
Deny security action  
deploying
       security policy   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
deployment
       security considerations   2nd   3rd   4th   5th   6th   7th  
Deployment Package Wizard   2nd   3rd  
DeriveBytes class   2nd   3rd   4th   5th   6th   7th   8th  
DES (Data Encryption Standard)  
designing for security   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd  
desktop applications   2nd  
development
       security considerations   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  
Digest Authentication   2nd   3rd   4th  
digest authentication  
digital certificates   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  
       X.509/PKIX digital certificates   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
Digital Signature Algorithm (DSA)   2nd  
digital signatures   2nd   3rd   4th  
       Authenticode signatures   2nd   3rd   4th  
       public/private key pairs   2nd   3rd   4th  
       XML digital signatures
               creating with .NET Framework   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th   49th   50th   51st   52nd   53rd   54th   55th   56th   57th   58th   59th   60th   61st   62nd   63rd   64th  
               detached digital signatures   2nd   3rd   4th   5th   6th  
               ds[ colon ]CanonicalizationMethod element   2nd   3rd   4th   5th  
               ds[colon]KeyInfo element   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  
               ds[colon]Reference element   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd  
               ds[colon]Signature element   2nd   3rd   4th   5th   6th   7th  
               ds[colon]SignatureMethod element   2nd   3rd   4th   5th  
               ds[colon]SignatureValue element   2nd   3rd  
               ds[colon]SignedInfo element   2nd   3rd   4th   5th   6th  
               enveloped or embedded digital signatures   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
               signing time   2nd   3rd  
               structure   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th   49th   50th   51st   52nd   53rd   54th   55th   56th   57th   58th   59th   60th   61st   62nd   63rd   64th   65th   66th   67th   68th   69th   70th   71st   72nd  
               verifying   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               wrapped digital signatures   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th  
               XMLDSIG   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd  
direct execution of assemblies   2nd   3rd   4th  
directories
       Access Control Lists (ACLs)   2nd   3rd   4th   5th   6th  
        sandboxing a directory on the local hard drive   2nd  
disallowing all assemblies from an Internet site on a machine   2nd  
disallowing assemblies to do anything but execute   2nd  
DLL Hell   2nd  
DLLs
       versioning   2nd  
DnsPermission class  
documentation
       security policy changes   2nd  
domain name restrictions   2nd   3rd  
Donut virus  
downloaded executables   2nd   3rd  
ds[colon]CanonicalizationMethod element   2nd   3rd   4th   5th  
ds[colon]KeyInfo element   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  
ds[colon]Reference element   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd  
ds[colon]Signature element   2nd   3rd   4th   5th   6th   7th  
ds[colon]SignatureMethod element   2nd   3rd   4th   5th  
ds[colon]SignatureValue element   2nd   3rd  
ds[colon]SignedInfo element   2nd   3rd   4th   5th   6th  
DSA (Digital Signature Algorithm)   2nd  
DSACryptoServiceProvider class   2nd   3rd   4th   5th   6th   7th  
DSACrytoServiceProvider class  
duplicating
       code groups   2nd  
       permission sets   2nd  
Dynamic Access Control List (DACL)   2nd   3rd   4th   5th   6th   7th   8th  

for RuBoard


. NET Framework Security
.NET Framework Security
ISBN: 067232184X
EAN: 2147483647
Year: 2000
Pages: 235

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net