Index C

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

C# syntax, converting to Visual Basic syntax 
call stack  2nd  [See also stack walk]
CanTransformMultipleBlocks property 
CAS (code-access security)
    application domains and 
    ASP.NET and 
    classes 
    code-access permissions 
    Code-Access Security Policy tool 
    enforcing 
    evidence 
    extensions, assembly trust and 
    isolated storage and 
    .NET Framework Configuration tool 
    overview 
    permissions 
        assembly scope attributes 
        attribute class definitions 
        creating custom 
        dll creation 
        enforcing security 
        example custom class 
        example custom class definition 
        example custom class enumeration 
        IPermission interface 
        ISecurityEncodable interface 
        IUnrestrictedPermission interface 
        overview 
    Permissions View tool 
    security policy 
    statements
        imperative security 
        overview 
    turning on/off 
    user policy level 
    Windows security and 
case sensitivity, C# 
Caspol.exe  2nd 
    CAS, turning on/off 
    execution permission checks, turning on/off 
    forcing securing changes 
    isolated storage security 
    policy evaluation 
    policy level administration 
        code groups 
        fully trusted assemblies 
        named permission sets 
        target code group 
    resetting policies 
catalogue (COM+), viewing 
CBC (Cipher Block Chaning) cipher mode 
Certificate Creation tool 
certificates
    publisher 
    X509, creating 
CFB (Cipher Feedback) cipher mode 
Check method 
    IMembershipCondition interface 
CheckExecutionRights property 
child code groups (security policies) 
Children property, CodeGroup objects 
Cipher Block Chaining (CBC) cipher mode 
Cipher Feedback (CFB) cipher mode 
cipher functions  2nd  [See also algorithms]
    block padding 
    CFB (Cipher Feedback) 
    cipher block chaining 
    ECB 
    XTEA 
cipher modes 
    CFB (Cipher Feedback) 
    Cipher Block Chaining (CBC) 
    ECB (Electronic Codebook) 
    symmetric algorithms, configuring 
ciphertext 
class hierarchies (quick-reference) 
class libraries, trust levels 
classes
    AsymmetricAlgorithm 
    AsymmetricExchangeDeformatter 
    AsymmetricExchangeFormatter 
    AsymmetricSignatureDeformatter 
    AsymmetricSignatureFormatter 
    attribute, defining 
    AuthorMembershipCondition example 
    C#/Visual Basic syntax 
    code-access permission 
    custom membership condition 
    defining 
    ElGamalOAEKeyExchangeFormatter 
    ElGamalOAEPKeyExchangeDeformatter 
    ElGamalPKCS1SignatureFormatter 
    ElGamalSignature 
    Evidence 
    evidence
        implementation 
        standard evidence classes 
    Hash class 
    identity permission 
    IMembershipCondition interface and 
    namespace quick reference and 
    .NET Framework, COM+ and 
    permission attribute 
    permission statements 
    permissions, programming considerations 
    RandomNumberGenerator 
    SecurityElement 
    signature formatter classes, digital signatures 
    SignedXML 
    Site class 
    StrongName 
    Url 
    XMLDSIG 
    Zone 
classesPublisher 
client certificate authentication, IIS 
CloseDefect method 
CLR (Common Language Runtime)
    application domains  2nd 
        configuration 
        evidence 
        identity 
        security policy and 
    application execution and 
    ASP.NET
        applications 
        runtime 
    evidence
        application domains 
        assemblies 
    identities, application domains 
    Internet Explorer and 
    non-type-safe code 
    operating system, shell command execution 
    security policy, application domains and 
    type-safe code 
    verification, application deployment and 
Code Access Security Policy tool 
code groups 
    attributes, policy resolution 
    Caspol.exe and 
    Code-Access Security Policy tool and 
    creating  2nd  3rd 
    creating manually 
    importing, from file selects 
    membership conditions, programming 
    named permission sets and 
    policy levels 
    policy statements, programming 
code-access security  [See CAS]
Code-Access Security Policy tool  2nd 
    code-access security, turning on/off 
    execution permission checks, turning on/off 
    forcing security changes  2nd 
    policy level administration 
        code groups 
        fully trusted assemblies 
        named permission sets 
        target code group 
    resetting policies 
CodeAccessPermission class
    interfaces 
    methods 
    removing stack walk overrides 
CodeAccessSecurityAttribute class 
CodeGroup class 
    methods and properties 
COM+ 
    application management 
    application roles, populating 
    application types 
        specifying 
    applications, installing 
    attributes
        ApplicationAccessControl 
        ComponentAccessControl 
        SecureMethod 
        SecurityRole 
    catalogue, viewing 
    component management 
    configuration 
    Maeshaller role 
    PAS (process-access security)
        authentication 
        impersonation 
    RBS (role-based security) 
        compatibility with .NET role-based security 
    roles, scope 
    serviced components, creating 
command line, Code-Access Security Policy tool 
compiling
    assemblies 
        creating 
        GAC and  2nd 
    decompiling 
        assemblies 
        protecting against 
Component Services explorer (COM+) 
ComponentAccessControl attribute (COM+) 
ComputeHash method 
    streamed data 
ComputeSignature method 
confidentiality
    cryptography 
    symmetric encryption 
configuration
    application domains 
    ASP.NET
        files 
        <location\\> element 
        logon page 
        security-related configuration elements 
    COM+ 
    forms authentication 
    IIS authentication modes 
    security policy  2nd 
    SecurityPermissionAttribute class, properties 
    shared assemblies and 
    symmetric algorithms
        cipher modes 
        Key and IV properties 
        KeySize and BlockSize properties 
    WindowsPrincipal class 
configured classes (COM+) 
ControlDomainPolicy permission 
ControlEvidence permission 
    System.Security.SecurityException 
ControlPolicy permission 
Copy method 
    IPermission interface 
cracker (roles) 
Create method
    hashing algorithms 
    SymmetricAlgorithm class 
CreateDecryptor method 
CreateDirectory method 
CreateEncryptor method  2nd 
CreateEventSource method, registering event sources 
CreateFromUrl factory method 
CreateKeyExchange method 
CreateKeyPair method 
CreateNewDefect method 
CreatePermission method 
CreateSignature method 
credentials, RBS and 
cryptanalysis 
Crypto API (Windows) 
cryptographic hash code 
cryptographic key pairs 
cryptographic keys
    complexity 
    CreateKeyExchange method 
    creating
        algorithm classes and 
        key-derivation protocol 
        random number generator and 
    ElGamal encryption functions 
    ElGamalOAEPKeyExchangeFormatter class 
    key exchanges, encryption 
    overview 
    persistence 
    session keys 
        encryption 
    symmetric algorithms 
    symmetric key exchange 
Cryptographic Service Provider (CSP) 
cryptography  2nd 
    attacks on, types of 
    authentication 
    birthday attacks 
    brute force attacks 
    confidentiality 
    hash functions 
    hashing algorithms 
        creating 
        hash code lengths 
        message size limits 
    integrity 
    key management 
    message collisions 
    software weaknesses 
Cryptography.DSA class
    CreateSignature method 
    VerifySignature method 
CryptoStream class 
    XTEA (Extended Tiny Encryption Algorithm) 
CSP (Cryptographic Service Provider) 
CurrentPrincipal property, IPrincipal interface 
custom event logs, creating 
custom evidence
    Author assembly 
    constructors 
    creating 
    identity permissions 
    immutability 
    Object.ToString method 
    serializing 
    uses 
custom runtime hosts 



Programming. NET Security
Programming .Net Security
ISBN: 0596004427
EAN: 2147483647
Year: 2005
Pages: 346

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net