Index T

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

test certificate 
tester role (COM+) 
    applications, security applications 
    custom membership conditions 
    ElGamal algorithm 
    implementation classes, hashing algorithms 
third-party software, benefits and risks 
threads, stack walks and 
ToXml method 
ToXmlString method 
TransformBlock method 
TransformFinalBlock method 
Triple-DES algorithm 
trust levels
    Author assembly 
    class libraries 
    restricted resources and 
    role-based security and 
    secure application design 
trust relationships 
trust, restricted resources and 
trusted assemblies, fully trusted assemblies list 
type-safe code
    application isolation and 
    non-type-safe code 
types  [See also classes]
    names for 

Programming. NET Security
Programming .Net Security
ISBN: 0596004427
EAN: 2147483647
Year: 2005
Pages: 346

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: