Index I

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

ICollection collection, implementation 
ICryptoTransform interface 
    XTEA 
IDefectTracker interface 
identification, trust and 
identities
    .NET RBS 
    application domains 
    assemblies, evidence 
    evidence 
<identity\\> element, impersonation 
identity permission 
    classes 
identity permissions 
    custom evidence and 
IIdentity interface
    .NET RBS and 
    WindowsIdentity class 
IIdentityPermissionFactory interface 
IIS (Internet Information Service)
    ASP.NET and 
    authentication
        anonymous access 
        basic authentication 
        client certificate authentication 
        digest authentication 
        impersonation and 
        integrated Windows authentication 
        mode configuration 
IMembershipCondition interface  2nd 
    custom membership conditions 
    member implementation 
imperative demands 
imperative RBS demands 
imperative security statements 
    Assert operations 
    Deny operations 
    executing with SecurityPermission objects 
    PermitOnly operations 
Impersonate method, WindowsIdentity object 
impersonation
    ASP.NET 
    COM+ process-access security (PAS) 
implementation classes
    ElGamal algorithm 
    hashing algorithms 
        testing 
    XTEA 
importing
    code groups, from file selects 
    named permission sets 
ImportParameters method  2nd  3rd 
inheritance, evidence 
InheritanceDemand statement 
initialization vector (IV) 
    symmetric algorithms, configuring 
Initialize method, implementing 
installation
    assemblies 
        into GAC 
    COM+ applications 
    key pairs, into CSP container 
integrated Windows authentication, IIS 
integrity, cryptography 
intellectual property, theft, decompiling and 
interfaces
    C#/Visual Basic syntax 
    CodeAccessPermission class 
    identity permissions 
    IPermission, imperative RBS demands 
    namespace quick reference and 
Internet access, resource restrictions 
Internet Explorer, CLR and 
Intersect method, IPermission interface 
intersection permission sets 
IPermission interface 
    imperative RBS demands 
    implementing 
    methods 
IPrincipal interface
    CurrentPrincipal property 
    .NET RBS 
        IPrincipal object 
    PrincipalPolicy enumeration 
    SetThreadPrincipal method 
    WindowsPrincipal class 
ISecurityEncodable interface 
    implementing 
    methods 
isf argument, IsolatedStorageFile class 
IsGranted method 
isolated storage
    administration 
    application domains and 
    as primary storage 
    by application domain 
    by assembly 
    by user 
    CAS and 
    DeleteDirectory method 
    DeleteFile method 
    directories
        deleting 
        GetDirectoryNames method 
        searches 
    files 
        deleting 
        GetFileNames method 
        searches 
    GetUserStoreForAssembly method 
    GetUserStoreForDomain method 
    IsolatedStorageFile class 
    IsolatedStorageFileStream class 
    levels of isolation 
    limitations 
    overview  2nd 
    Remove method 
    security
        Caspol.exe 
        Mscorcfg.msc 
    security policy configuration 
    stores  2nd 
        deleting 
        directories 
    user-level isolation 
Isolated Storage tool 
IsolatedStorageContainment enumeration 
IsolatedStorageException 
IsolatedStorageFile class, isf argument 
IsolatedStorageFile instances, passing 
IsolatedStorageFile.GetStore method 
IsolatedStorageFileStream class, Handle property 
IsSubsetOf method, IPermission interface 
IStackWalk interface 
    PermissionSet class 
IsUnrestricted method 
IUnrestrictedPermision interface, methods 
IUnrestrictedPermission interface 
    implementing 
IV (initialization vector) 
IV property, symmetric algorithm 



Programming. NET Security
Programming .Net Security
ISBN: 0596004427
EAN: 2147483647
Year: 2005
Pages: 346

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net