|
Warhol viruses, The Arms Race of Hacking
weak names
strong-name signatures, compared to, Strong Names vs. Weak Names
Web applications
defined, Summary
Web services
access issues, Securing Web Services
authentication issues, Securing Web Services
authorization issues, Securing Web Services
design considerations, Securing Web Services
Enhancements download, Securing Web Services, Global XML Architecture
GXA for, Global XML Architecture
managed security issues, Securing Web Services
platform compatibility, Securing Web Services
SSL for, Securing Web Services
test mode for, Securing Web Services
Windows authentication for, Securing Web Services
WMI reporting example, Securing Web Services
Web site replication by hackers, Take the Attacker’s View
Web site security
basic principles of, Securing Web Applications in the Real World
Web-page manipulation tools, Table 9-3: Test Tools
Web.config files
Authorization section, ASP.NET Authentication and Authorization
Forms authentication with, Forms Authentication
Forms authorization with, Forms Authentication
Passport authentication, setting, Install the Passport SDK
WebPermission, Table 3-3: Full Trust Permissions Granted to My Computer Zone
WebTester sample application, Example: Create a Test Tool for Testing Web Applications
WEP, What Happens Next?
Windows API functions, Table 15-1: Visual Basic .NET Keywords to Look For_ (continued)
Windows authentication
advantages over SQL Server Authentication, SQL Server Authentication
changing from Mixed Mode, SQL Server Authentication
determining logged-on users, Determining Who Is Logged On
logons, setting up, SQL Server Authentication
recommendation, Step 7: Design for Simplicity and Usability
SQL Server 2000, for, SQL Server Authentication
Web services, securing, Securing Web Services
Windows clients
auditing, enabling, Enable Auditing
BIOS passwords, Implement BIOS Password Protection
disabling auto logon, Disable Auto Logon
file-sharing software, Remove File-Sharing Software
floppy drives, disabling booting from, Disable Boot from Floppy Drive
locking down, Locking Down Windows Clients, Disable Boot from Floppy Drive
MBSA with, Locking Down Windows Clients
NTFS recommended, Format Disk Drives Using NTFS
screen saver passwords, Use Screen-Saver Passwords
sharing, turning off, Turn Off Unnecessary Sharing
turning off services, Turn Off Unnecessary Services
Windows Forms
adding to Web pages, How Visual Basic .NET Determines Zone
Authenticode signing, Strong Naming, Certificates, and Signing Exercise
no-touch deployment, No-Touch Deployment, Table 10-1: Deployment Techniques and When to Use Them_ (continued)
strong-name signing, Strong Naming, Certificates, and Signing Exercise
validation tools, Validation Tools Available to Windows Forms Applications
zone assignments, How Visual Basic .NET Determines Zone, Table3-5: Security Zone Assignments for .NET Applications
Windows Installer
overview, Windows Installer Deployment
permissions with, Deploy and Run Your Application in the .NET Security Sandbox
sandbox with, Table 10-2: Deployment Techniques and Use of the Sandbox
when to use, Table 10-1: Deployment Techniques and When to Use Them_ (continued)
Windows integrated security
advantages of, Role-Based Authorization in the Real World, Windows Integrated Security Authentication
anonymous logins, denying, Windows Integrated Security Authentication
ASP.NET authentication with, Table 4-1: Authentication Types for ASP.NET Applications
best use for, ASP.NET Authentication in the Real World
domain restriction, Windows Integrated Security Authentication
firewalls with, Windows Integrated Security Authentication
Impersonation, Windows Integrated Security Authentication
Netscape browsers with, Windows Integrated Security Authentication
purpose of, Windows Integrated Security
using with applications, Windows Integrated Security
Windows NT
file protection for Microsoft Access, Locking Down Microsoft Access
locking down, Fundamental Lockdown Principles
Windows servers
locking down, Locking Down Windows Servers, Install a Firewall
service packs, Fundamental Lockdown Principles
Windows 2003 Server, Microsoft Initiatives
Windows 9x
locking down, Fundamental Lockdown Principles
WindowsIdentity objects, The Identity and Principal Objects, Chapter 2: Role-Based Authorization
WindowsPrincipal objects, Chapter 2: Role-Based Authorization
WMI (Windows Management Instrumentation)
purpose of, Windows Management Instrumentation, Securing Web Services
WMI Web services example, Securing Web Services
WS-Security, Global XML Architecture
W3SVC service, Turn Off Unnecessary Services
|