S_Index

for RuBoard
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

SACL (System Access Control List)  
sandboxing a directory on the local hard drive   2nd  
SANS (Security Administration, Networking, and Security)  
Scheduled Task Wizard  
scheduled tasks  
scripts   2nd   3rd   4th  
       Caspol tool   2nd   3rd   4th   5th  
       security policy administration   2nd   3rd   4th  
secret key ciphers  
secret key derivation   2nd   3rd   4th   5th   6th   7th   8th  
sectionGroup element   2nd  
secure code
       definition  
       developer •s role   2nd   3rd   4th   5th   6th   7th   8th   9th  
       levels of trust   2nd   3rd   4th   5th   6th   7th   8th  
Secure Hash Algorithm (SHA-1)  
Secure Sockets Layer (SSL)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th  
       IIS  
secure Web sites
       attacks   2nd   3rd   4th   5th   6th   7th   8th   9th  
       authentication   2nd   3rd  
       authorization   2nd   3rd   4th   5th   6th  
       channels   2nd   3rd   4th  
       designing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
       firewalls  
       implementing   2nd   3rd   4th   5th   6th   7th   8th   9th  
       log files   2nd   3rd   4th  
       NetBIOS ports  
       protected modules   2nd   3rd  
       SecureOffice example  
       SSL  
SecureOffice Web site
       goals  
       hardware  
        user base  
security
       application designs   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd  
       ASP.NET
               authentication for Web services   2nd   3rd   4th  
               Code Access Security   2nd   3rd   4th   5th   6th  
               forms authentication   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  
               impersonation   2nd   3rd   4th  
               overview   2nd   3rd  
               passport authentication   2nd   3rd   4th  
       considerations
               during deployment   2nd   3rd   4th   5th   6th   7th  
               during development   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  
               during execution   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th  
       databases   2nd  
       Internet Explorer   2nd  
       mobile code
               ActiveX controls   2nd   3rd   4th  
               downloaded executables   2nd   3rd  
               Java applets   2nd   3rd  
               scripts   2nd   3rd   4th  
               source code   2nd   3rd   4th  
       NET Framework
               calling the security system  
               class libraries   2nd  
               code identity-based security checking   2nd   3rd   4th   5th  
               extending the security system  
               limitations   2nd   3rd   4th   5th   6th   7th  
               PrincipalPermission  
               registry access   2nd  
               SecurityPermission.ControlEvidence  
               structure;PrincipalPermission  
       operating systems  
       software  
       software vulnerabilities
               buffer overflows   2nd   3rd   4th  
               canonicalization errors   2nd   3rd  
               denial-of-service attacks   2nd   3rd  
               information leaks   2nd   3rd  
                insecure default configurations   2nd  
       turning off   2nd  
security actions   2nd   3rd   4th   5th   6th   7th  
security administration
       breaches in security   2nd  
       Configuration tool
               creating a new policy level   2nd  
               exiting   2nd  
               installing  
               main security administrative options   2nd   3rd   4th   5th  
               MMC (Microsoft Management Console) requirements   2nd  
               obtaining  
               opening a policy level configuration file   2nd   3rd   4th  
               policy level features   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th   49th   50th   51st   52nd   53rd   54th   55th   56th   57th   58th   59th   60th   61st   62nd   63rd   64th   65th   66th   67th   68th   69th   70th   71st   72nd   73rd   74th   75th   76th   77th   78th   79th   80th   81st   82nd  
               policy tree manipulation options   2nd   3rd  
               self protection mechanism   2nd   3rd   4th   5th   6th  
               starting   2nd   3rd   4th   5th  
               uses   2nd  
       crytography settings
               administering   2nd   3rd   4th   5th   6th  
               Caspol  
               machine.config file   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               mappings   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               modifying   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
               testing changes   2nd   3rd   4th  
               uses  
       disallowing all assemblies from an Internet site on a machine   2nd  
       disallowing an assembly to do anything but execute   2nd  
       giving all assemblies file-read rights to a directory   2nd  
       granting all assemblies full trust on a machine   2nd  
       granting enterprise-wide full trust to an assembly   2nd  
       granting full trust to all assemblies of a software publisher   2nd   3rd  
       Isolated Storage
               administering   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  
               deleting all stores of a user   2nd   3rd  
               deleting content   2nd   3rd   4th   5th  
               permissions   2nd   3rd   4th  
               properties   2nd  
               state   2nd  
               Storeadm.exe tool   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  
               uses  
               viewing all stores of a user   2nd   3rd   4th   5th  
               viewing content   2nd   3rd   4th  
       preventing all assemblies of a software publisher from running across an enterprise   2nd  
       preventing an assembly from running across an enterprise   2nd   3rd  
       reducing level of trust for all assemblies   2nd  
       sandboxing a directory on the local hard drive   2nd  
       strategies   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd  
       wizards
               Adjust Security Wizard   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd  
               Create Deployment Package Wizard  
               Deployment Package Wizard   2nd   3rd  
               Evaluate Assembly Wizard   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               New Code Group Wizard   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  
               Trust Assembly Wizard   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th  
security benefits of .NET Framework   2nd   3rd  
security checks
       IL Validation   2nd   3rd   4th   5th  
       IL Verification   2nd   3rd   4th   5th   6th   7th   8th   9th  
       metadata validation   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
       PE File Format Validation   2nd   3rd   4th   5th   6th   7th  
       unverifiable code   2nd  
security choke points   2nd   3rd   4th   5th  
security custom attributes   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
security descriptors   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
security holes
       inlining   2nd   3rd   4th   5th  
security policy
        backups  
       changing   2nd   3rd   4th   5th   6th   7th   8th   9th  
       changing programmatically
               Caspol tool   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th   49th   50th   51st   52nd   53rd   54th   55th   56th   57th   58th   59th   60th   61st   62nd   63rd   64th   65th   66th   67th   68th   69th   70th   71st   72nd   73rd   74th   75th   76th   77th   78th   79th   80th   81st   82nd   83rd   84th   85th  
               scenarios   2nd  
               security policy APIs   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th   49th   50th  
       code groups   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd  
       corruption  
       default   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
       default security policy   2nd   3rd   4th  
       deploying   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
       documenting changes to security policy   2nd  
       file locations   2nd   3rd  
       interaction with operation system settings   2nd  
       machine policies   2nd   3rd   4th  
       membership conditions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th  
       mobile code   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
       permissions   2nd   3rd   4th  
       policy level features   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th   49th   50th   51st   52nd   53rd   54th   55th   56th   57th   58th   59th   60th   61st   62nd   63rd   64th   65th   66th   67th   68th   69th   70th   71st   72nd   73rd  
       policy levels   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th  
               code group hierarchy   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th  
               creating a new policy level   2nd  
               features   2nd   3rd   4th   5th   6th   7th   8th   9th  
               opening a policy level configuration file   2nd   3rd   4th  
               permission sets   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd  
               policy assemblies   2nd   3rd   4th   5th   6th   7th   8th  
               undoing changes   2nd  
       policy resolution  
       purpose   2nd   3rd   4th  
       resetting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  
       setting  
       structure   2nd   3rd  
       testing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       Trustworthy Computing initiative  
       user policies   2nd   3rd   4th   5th   6th  
       worst case scenarios   2nd  
security policy APIs
       classes
               NamedPermissionSet class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th  
               PolicyLevel class  
               SecurityManager class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
               UnionCodeGroup class  
       programming   2nd  
       security policy administration   2nd   3rd  
security policy model   2nd  
security syntax  
security vulnerabilities
       buffer overflows   2nd   3rd   4th  
       canonicalization errors   2nd   3rd  
       denial-of-service attacks   2nd   3rd  
       information leaks   2nd   3rd  
       insecure default configurations   2nd  
       resources
                CVE (Common Vulnerabilities and Exposures) Project  
               CERT (Computer Emergency Response Team)  
               SANS (System Administration, Networking, and Security)  
               SecurityFocus  
               SecurityFocus vulnerability database  
security zones
       evidence  
       mobile code   2nd  
SecurityExceptions
       semi-trusted applications  
SecurityFocus  
SecurityFocus vulnerability database  
SecurityManager class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
SecurityPermission class   2nd   3rd  
securityPolicy element   2nd   3rd   4th   5th   6th   7th   8th  
semantic metadata validation  
semi-trusted applications
       class libraries   2nd   3rd   4th   5th   6th   7th   8th  
       code execution   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th  
       definition  
       networks   2nd  
       permissions   2nd   3rd   4th   5th   6th   7th   8th  
       sensitive data   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th  
ServiceControllerPermission class  
services
       access control   2nd  
sessionState element   2nd   3rd   4th   5th   6th  
SHA-1 (Secure Hash Algorithm)  
shared assemblies   2nd   3rd   4th  
side-by-side support  
signatures
       XML digital signatures
               SignedXml class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th  
SignedXml class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th  
signing assemblies   2nd   3rd   4th   5th   6th   7th   8th   9th  
Simple Object Access Protocol (SOAP)
       XML  
sinks   2nd   3rd  
SiteIdentityPermission class  
SN utility   2nd   3rd  
snap-ins (MMC)
       Configuration tool   2nd  
SOAP
       Web Services   2nd   3rd   4th  
SOAP (Simple Object Access Protocol)
       XML  
SocketPermission class  
software
       security mechanisms  
       security problems
               buffer overflows   2nd   3rd   4th  
               canonicalization errors   2nd   3rd  
               denial-of-service attacks   2nd   3rd  
               information leaks   2nd   3rd  
               insecure default configurations   2nd  
Software Restriction Policies   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  
source code   2nd   3rd   4th  
SQL server databases
       authentication   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
SqlClientPermission class  
SSL
       IIS  
SSL (Secure Sockets Layer)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th  
stack walks
       application performance  
       semi-trusted applications   2nd  
stacks
       data storage   2nd  
        frames   2nd  
       popping  
       process layouts   2nd  
       pushing  
       stack pointers   2nd  
       threads   2nd   3rd  
       uses   2nd   3rd  
       walking the stack   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st  
standard permissions  
starting
       Caspol tool   2nd   3rd  
       Configuration tool   2nd   3rd   4th   5th  
       Wizards launcher  
states (permission sets)   2nd   3rd  
states (permissions)   2nd   3rd   4th  
Storeadm tool   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  
storing data
       stacks   2nd  
streams
       cryptography   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  
strong names
       assemblies   2nd   3rd   4th   5th  
       building into assemblies   2nd   3rd   4th   5th   6th   7th   8th   9th  
       key pair generation   2nd   3rd   4th   5th   6th   7th   8th   9th  
       side-by-side support  
       signature invalidation   2nd   3rd   4th  
StrongNameIdentityPermission class  
structural metadata validation  
subtags  
Sun
       Web address  
switching off security   2nd  
symmetric algorithms   2nd   3rd   4th   5th   6th  
symmetric key encryption  
SymmetricAlgorithm class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd  
System Access Control List (SACL)  
System.AppDomain class   2nd  
System.Data.OleDb.OleDbPermission class  
System.Data.SqlClient.SqlClientPermission class  
System.Diagnostics.EventLogPermission class  
System.Diagnostics.PerformanceCounterPermission class  
System.Drawing.Printing.PrintingPermission class  
System.Messaging.MessageQueuePermission class  
System.Net.DnsPermission class  
System.Net.SocketPermission class  
System.Net.WebPermission class  
System.Security namespace  
System.Security.CodeAccessPermission class   2nd   3rd   4th  
System.Security.Cryptography.Xml namespace   2nd   3rd   4th   5th   6th   7th   8th  
System.Security.Crytography.Xml namespace   2nd   3rd   4th   5th   6th  
System.Security.NamedPermissionSet class  
System.Security.Permissions namespace   2nd   3rd   4th  
System.Security.Permissions.EnvironmentPermission class  
System.Security.Permissions.FileDialogPermission class  
System.Security.Permissions.FileIOPermission class  
System.Security.Permissions.IsolatedStorageFilePermission class  
System.Security.Permissions.PrincipalPermission class  
System.Security.Permissions.PublisherIdentityPermission class  
System.Security.Permissions.ReflectionPermission class  
System.Security.Permissions.RegistryPermission class  
System.Security.Permissions.SecurityPermission class  
System.Security.Permissions.SiteIdentityPermission class  
System.Security.Permissions.StrongNameIdentityPermission class  
System.Security.Permissions.UIPermission class  
System.Security.Permissions.UrlIdentityPermission class  
System.Security.Permissions.ZoneIdentityPermission class  
System.Security.PermissionSet class  
System.Security.Policy namespace  
System.Security.Policy.CodeGroup class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
System.Security.Policy.Evidence class   2nd   3rd   4th   5th   6th  
System.Security.Policy.MembershipCondition class   2nd   3rd   4th  
System.Security.Policy.PolicyException class  
System.Security.Policy.PolicyLevel class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th  
System.Security.SecurityElement class  
System.ServiceProcess.ServiceControllerPermission class  
system.web element   2nd   3rd   4th   5th   6th   7th  

for RuBoard


. NET Framework Security
.NET Framework Security
ISBN: 067232184X
EAN: 2147483647
Year: 2000
Pages: 235

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net