[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
validation
Code Access Security 2nd
IL Validation 2nd 3rd 4th 5th
metadata
metadata validation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
PE File Format Validation 2nd 3rd 4th 5th 6th 7th
verification
Code Access Security 2nd
IL Verification 2nd 3rd 4th 5th 6th 7th 8th 9th
PE Verify
PEVerify tool
unverifiable code 2nd
verifying
assemblies 2nd 3rd 4th 5th 6th 7th 8th 9th
XMLDSIG signatures 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
versioning
DLLs 2nd
viewing
Isolated Storage 2nd 3rd 4th 5th 6th 7th 8th 9th
permission sets 2nd 3rd
Virtual Directory Creation Wizard
viruses
Donut virus
visibility
security problems in semi-trusted applications 2nd 3rd
vulnerabilities
buffer overflows 2nd 3rd 4th
canonicalization errors 2nd 3rd
denial-of-service attacks 2nd 3rd
information leaks 2nd 3rd
insecure default configurations 2nd
resources
CVE (Common Vulnerabilities and Exposures) Project
CERT (Computer Emergency Response Team)
SANS (System Administration, Networking, and Security)
SecurityFocus
SecurityFocus vulnerability database