|
Validate events, Validation Tools Available to Windows Forms Applications
validation, Chapter 7: Validating Input
ASP.NET controls for, Validation Tools Available to ASP.NET Web Applications
bowling scores example, Parse Method, Input to Subroutines
canonicalization errors, Enforce Canonical Filenames
client-side, Validation Tools Available to ASP.NET Web Applications
client-side dangers, Don’t Rely on Data Sent to the Client
CompareValidator, Table 7-1: Validator Controls Available for ASP.NET
currency input, Parse Method
CustomValidator, Table 7-1: Validator Controls Available for ASP.NET
dates, Parse Method
defense-in-depth, Validation Tools Available to ASP.NET Web Applications
direct user input, Direct User Input, Figure 7-1: The error displayed by the RegularExpressionValidator control
Dos attacks, preventing, Defending Against Memory and Resource DoS Attacks
ErrorProvider class, Validation Tools Available to Windows Forms Applications
free-form input, Direct User Input
functions, sample, Validating Input
HTML script, turning off, Cross-Site Scripting Attacks
HtmlEncode method, Web Application Input
importance of, Chapter 7: Validating Input
input-related attacks, Chapter 7: Validating Input
inputs to SQL statements, Validate Input Parameters
IsValid property, checking, Validation Tools Available to ASP.NET Web Applications
length of input, limiting, Validation Tools Available to Windows Forms Applications
maximum length for input, Parse Method
nonuser input, Nonuser Input
numeric input, Parse Method
Page_Load events with, Validation Tools Available to ASP.NET Web Applications
Parse method for, Parse Method
prices changed by clients, Don’t Rely on Data Sent to the Client
RangeValidator, Table 7-1: Validator Controls Available for ASP.NET
regular expressions for, Enforce Canonical Filenames, Regular Expressions, Table 7-2: Examples of Regular Expressions
RegularExpressionValidator, Table 7-1: Validator Controls Available for ASP.NET, Validation Tools Available to ASP.NET Web Applications, Figure 7-1: The error displayed by the RegularExpressionValidator control
Request object input, Web Application Input, Don’t Rely on Data Sent to the Client
RequiredFieldValidator, Table 7-1: Validator Controls Available for ASP.NET
server-side, Validation Tools Available to ASP.NET Web Applications
SQL-injection attacks using, SQL-Injection Attacks
SSL with, Web-Based Input Attacks and SSL
subrouting input, Input to Subroutines
text boxes, with, Validation Tools Available to Windows Forms Applications
tools for, Direct User Input
user names, Generate Tests
Validate events, Validation Tools Available to Windows Forms Applications
Validate method of controls, Validation Tools Available to ASP.NET Web Applications
Web application input, Web Application Input, Don’t Rely on Data Sent to the Client
Windows Forms tools for, Validation Tools Available to Windows Forms Applications
ValidationSummary control, Table 7-1: Validator Controls Available for ASP.NET
VBA (Visual Basic for Applications), Locking Down Microsoft Access
VBscript
disabling, Take the Attacker’s View
VeriSign
obtaining certificates from, How SSL Works
version integrity
strong-name signatures for, Strong-Name Signing
virus scanning
recommended, If You Do Nothing Else…
viruses
attachments containing, Code-Access Security in the Real World
intensifying trend, What Happens Next?
vulnerabilities
increasing number of, The Arms Race of Hacking
methods for avoiding damage from, Analyze for Threats and Vulnerabilities
non-Windows OSs, No Operating System Is Safe
vulnerabilities, Web applications
overview, Is It a Bug, or an Attack from a Criminal Mastermind?
vulnerabilities., see analyzing for vulnerabilities
|