Index_E


E

early detection of attacks, Early Detection

elevation of privilege attacks, Table 14-1: STRIDE Threat Categories

employee management system sample, Practice Files

Employee Management System sample application, Appendix A: Guide to the Code Samples, Employee Management System

clsEmployee class, Employee Management System

database for, Appendix A: Guide to the Code Samples, Employee Database Structure, Migrating the Employee Database to SQL Server 2000

frmAddNew, Employee Management System

frmDashboard, Employee Management System

frmManage, Employee Management System

frmMyInfo, Employee Management System

frmRemoveUser, Employee Management System

valid usernames for, Employee Management System, Table A-1: List of Valid Usernames

Employee Management Web sample application, Employee Management Web

EmployeeDatabase.mdb, Practice Files, Appendix A: Guide to the Code Samples, Employee Database Structure, Migrating the Employee Database to SQL Server 2000

encryption

baseball example, Chapter 1: Encryption

brute force attacks, Keeping Private Keys Safe

defined, Chapter 1: Encryption

export restrictions on, Export Restrictions on Encryption

file integrity, verifying, Encryption in the Real World

folders, of, Format Disk Drives Using NTFS

goals of, Chapter 1: Encryption

insecure transport, as solution for, Encryption in the Real World

Internet transmissions using, Encryption in the Real World

key-based. , see private key encryption

private key. , see private key encryption

public key. , see public key encryption

purposes of, Encryption in the Real World

encryption demo

location of, Appendix A: Guide to the Code Samples

purpose of, Encryption Demo

encrytion

SSL. , see ssl (secure sockets layer)

Environment keyword, Table 15-1: Visual Basic .NET Keywords to Look For_ (continued)

environment variable permissions, Table 3-2: Permissions for Each Zone, Table 3-4: Permissions for Local Intranet and Trusted Sites Zones

error messages

flawed, Exception Handling

ErrorProvider class, Validation Tools Available to Windows Forms Applications

errors., see exceptions

Ethereal, Chapter 5: Securing Web Applications

event log permission, Table 3-2: Permissions for Each Zone, Table 3-4: Permissions for Local Intranet and Trusted Sites Zones

events

viewing logs of, Viewing the Event Log Remotely

evidence, code-access, How Actions Are Considered Safe or Unsafe, Security Zones and Trust Levels

exception handlers

detecting attacks with, Detecting That an Attack Has Taken Place or Is in Progress

exceptions, Chapter 8: Handling Exceptions

adding handlers, Exception Handling, Global Exception Handlers

bubbling up of, Global Exception Handlers

causes of, Where Exceptions Occur

COM interop– based , Global Exception Handlers

crashes as causes of, Where Exceptions Occur

database-generated, Exception Handling

encryption, logging, Logging Exceptions

error messages reporting, Exception Handling

file related, Where Exceptions Occur

Finally clauses, Try…Catch or On Error GoTo

global exception handlers, Global Exception Handlers

handling, rules for, Exception Handling

handling. , see handling exceptions

help for users, Exception Handling

input related, Where Exceptions Occur

logging, Exception Handling, Viewing the Event Log Remotely

multiuser conflicts, Where Exceptions Occur

network errors causing, Where Exceptions Occur

On ErrorGoTo statements, Try…Catch or On Error GoTo, Exception Handling

purpose of, Chapter 8: Handling Exceptions

real-world considerations, Exception Handling in the Real World

resources, lack of causing, Where Exceptions Occur

sample application with, Exception Handling

security issues arising from, Where Exceptions Occur

stress causing, Where Exceptions Occur

Try...Catch blocks, Try…Catch or On Error GoTo, Exception Handling

Execute keyword, Table 15-1: Visual Basic .NET Keywords to Look For_ (continued)

existing software design challenge, Design Challenges

exploits

defined, Is It a Bug, or an Attack from a Criminal Mastermind?

export restrictions on encryption, Export Restrictions on Encryption

extensibility, dangers of, Plan of Attack—The Test Plan




Security for Microsoft Visual Basic  .NET
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net