|
named-pipes, Named-Pipes vs. TCP-IP
Napster, Remove File-Sharing Software
Netcat, Table 9-3: Test Tools
NetMon, Table 9-3: Test Tools
Netscape browsers
Windows integrated security with, Windows Integrated Security Authentication
network bandwidth starvation attacks, Table 6-1: Forms of DoS Attacks
network firewalls., see firewalls
network redirection tools, Table 9-3: Test Tools
network shares
file access, code-based, Run Your Code in Different Security Zones
goals of code-access security, What Code-Access Security Is Meant To Protect
Local Intranet zone default, How Visual Basic .NET Determines Zone
simulating on single computers, Run Your Code in Different Security Zones
networks
exceptions arising from, Where Exceptions Occur
news groups, monitoring, Early Detection
no-touch deployment
Authenticode with, When to Use Authenticode Signing
overview, No-Touch Deployment
sandbox with, Table 10-2: Deployment Techniques and Use of the Sandbox
upgrades using, Step 10: Design for Maintenance
when to use, Table 10-1: Deployment Techniques and When to Use Them_ (continued)
non-canonical filenames, Enforce Canonical Filenames
nonrepudiation, Table 14-1: STRIDE Threat Categories
nonuser input, Nonuser Input
NTFS file system, Fundamental Lockdown Principles, Format Disk Drives Using NTFS
numeric input
validating, Parse Method
NUnit, Automated Unit Testing, Table 9-3: Test Tools
|