|
off switches, Step 10: Design for Maintenance
OleDbPermission, Table 3-3: Full Trust Permissions Granted to My Computer Zone
On ErrorGoTo statements, Try…Catch or On Error GoTo, Exception Handling
one-way cryptography
digests, Hash Digests
hashes as example of. , see alsohashes
purpose of, Chapter 1: Encryption
Open keyword, Review Code for Threats, Table 15-1: Visual Basic .NET Keywords to Look For_ (continued)
Operating System security restrictions, OS Security Restrictions Preempt Everything, Code-Access Security Preempts Application Role-Based Security
operating system vulnerabilities, non-Windows, No Operating System Is Safe
OS security restrictions, OS Security Restrictions Preempt Everything, Code-Access Security Preempts Application Role-Based Security
Owner-Admin model, Microsoft Access User-Level Security Models
|