Index_V


V

Validate events, Validation Tools Available to Windows Forms Applications

validation, Chapter 7: Validating Input

ASP.NET controls for, Validation Tools Available to ASP.NET Web Applications

bowling scores example, Parse Method, Input to Subroutines

canonicalization errors, Enforce Canonical Filenames

client-side, Validation Tools Available to ASP.NET Web Applications

client-side dangers, Don’t Rely on Data Sent to the Client

CompareValidator, Table 7-1: Validator Controls Available for ASP.NET

currency input, Parse Method

CustomValidator, Table 7-1: Validator Controls Available for ASP.NET

dates, Parse Method

defense-in-depth, Validation Tools Available to ASP.NET Web Applications

direct user input, Direct User Input, Figure 7-1: The error displayed by the RegularExpressionValidator control

Dos attacks, preventing, Defending Against Memory and Resource DoS Attacks

ErrorProvider class, Validation Tools Available to Windows Forms Applications

free-form input, Direct User Input

functions, sample, Validating Input

HTML script, turning off, Cross-Site Scripting Attacks

HtmlEncode method, Web Application Input

importance of, Chapter 7: Validating Input

input-related attacks, Chapter 7: Validating Input

inputs to SQL statements, Validate Input Parameters

IsValid property, checking, Validation Tools Available to ASP.NET Web Applications

length of input, limiting, Validation Tools Available to Windows Forms Applications

maximum length for input, Parse Method

nonuser input, Nonuser Input

numeric input, Parse Method

Page_Load events with, Validation Tools Available to ASP.NET Web Applications

Parse method for, Parse Method

prices changed by clients, Don’t Rely on Data Sent to the Client

RangeValidator, Table 7-1: Validator Controls Available for ASP.NET

regular expressions for, Enforce Canonical Filenames, Regular Expressions, Table 7-2: Examples of Regular Expressions

RegularExpressionValidator, Table 7-1: Validator Controls Available for ASP.NET, Validation Tools Available to ASP.NET Web Applications, Figure 7-1: The error displayed by the RegularExpressionValidator control

Request object input, Web Application Input, Don’t Rely on Data Sent to the Client

RequiredFieldValidator, Table 7-1: Validator Controls Available for ASP.NET

server-side, Validation Tools Available to ASP.NET Web Applications

SQL-injection attacks using, SQL-Injection Attacks

SSL with, Web-Based Input Attacks and SSL

subrouting input, Input to Subroutines

text boxes, with, Validation Tools Available to Windows Forms Applications

tools for, Direct User Input

user names, Generate Tests

Validate events, Validation Tools Available to Windows Forms Applications

Validate method of controls, Validation Tools Available to ASP.NET Web Applications

Web application input, Web Application Input, Don’t Rely on Data Sent to the Client

Windows Forms tools for, Validation Tools Available to Windows Forms Applications

ValidationSummary control, Table 7-1: Validator Controls Available for ASP.NET

VBA (Visual Basic for Applications), Locking Down Microsoft Access

VBscript

disabling, Take the Attacker’s View

VeriSign

obtaining certificates from, How SSL Works

version integrity

strong-name signatures for, Strong-Name Signing

virus scanning

recommended, If You Do Nothing Else…

viruses

attachments containing, Code-Access Security in the Real World

intensifying trend, What Happens Next?

vulnerabilities

increasing number of, The Arms Race of Hacking

methods for avoiding damage from, Analyze for Threats and Vulnerabilities

non-Windows OSs, No Operating System Is Safe

vulnerabilities, Web applications

overview, Is It a Bug, or an Attack from a Criminal Mastermind?

vulnerabilities., see analyzing for vulnerabilities




Security for Microsoft Visual Basic  .NET
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net