Index_W


W

Warhol viruses, The Arms Race of Hacking

weak names

strong-name signatures, compared to, Strong Names vs. Weak Names

Web applications

defined, Summary

Web services

access issues, Securing Web Services

authentication issues, Securing Web Services

authorization issues, Securing Web Services

design considerations, Securing Web Services

Enhancements download, Securing Web Services, Global XML Architecture

GXA for, Global XML Architecture

managed security issues, Securing Web Services

platform compatibility, Securing Web Services

SSL for, Securing Web Services

test mode for, Securing Web Services

Windows authentication for, Securing Web Services

WMI reporting example, Securing Web Services

Web site replication by hackers, Take the Attacker’s View

Web site security

basic principles of, Securing Web Applications in the Real World

Web-page manipulation tools, Table 9-3: Test Tools

Web.config files

Authorization section, ASP.NET Authentication and Authorization

Forms authentication with, Forms Authentication

Forms authorization with, Forms Authentication

Passport authentication, setting, Install the Passport SDK

WebPermission, Table 3-3: Full Trust Permissions Granted to My Computer Zone

WebTester sample application, Example: Create a Test Tool for Testing Web Applications

WEP, What Happens Next?

Windows API functions, Table 15-1: Visual Basic .NET Keywords to Look For_ (continued)

Windows authentication

advantages over SQL Server Authentication, SQL Server Authentication

changing from Mixed Mode, SQL Server Authentication

determining logged-on users, Determining Who Is Logged On

logons, setting up, SQL Server Authentication

recommendation, Step 7: Design for Simplicity and Usability

SQL Server 2000, for, SQL Server Authentication

Web services, securing, Securing Web Services

Windows clients

auditing, enabling, Enable Auditing

BIOS passwords, Implement BIOS Password Protection

disabling auto logon, Disable Auto Logon

file-sharing software, Remove File-Sharing Software

floppy drives, disabling booting from, Disable Boot from Floppy Drive

locking down, Locking Down Windows Clients, Disable Boot from Floppy Drive

MBSA with, Locking Down Windows Clients

NTFS recommended, Format Disk Drives Using NTFS

screen saver passwords, Use Screen-Saver Passwords

sharing, turning off, Turn Off Unnecessary Sharing

turning off services, Turn Off Unnecessary Services

Windows Forms

adding to Web pages, How Visual Basic .NET Determines Zone

Authenticode signing, Strong Naming, Certificates, and Signing Exercise

no-touch deployment, No-Touch Deployment, Table 10-1: Deployment Techniques and When to Use Them_ (continued)

strong-name signing, Strong Naming, Certificates, and Signing Exercise

validation tools, Validation Tools Available to Windows Forms Applications

zone assignments, How Visual Basic .NET Determines Zone, Table3-5: Security Zone Assignments for .NET Applications

Windows Installer

overview, Windows Installer Deployment

permissions with, Deploy and Run Your Application in the .NET Security Sandbox

sandbox with, Table 10-2: Deployment Techniques and Use of the Sandbox

when to use, Table 10-1: Deployment Techniques and When to Use Them_ (continued)

Windows integrated security

advantages of, Role-Based Authorization in the Real World, Windows Integrated Security Authentication

anonymous logins, denying, Windows Integrated Security Authentication

ASP.NET authentication with, Table 4-1: Authentication Types for ASP.NET Applications

best use for, ASP.NET Authentication in the Real World

domain restriction, Windows Integrated Security Authentication

firewalls with, Windows Integrated Security Authentication

Impersonation, Windows Integrated Security Authentication

Netscape browsers with, Windows Integrated Security Authentication

purpose of, Windows Integrated Security

using with applications, Windows Integrated Security

Windows NT

file protection for Microsoft Access, Locking Down Microsoft Access

locking down, Fundamental Lockdown Principles

Windows servers

locking down, Locking Down Windows Servers, Install a Firewall

service packs, Fundamental Lockdown Principles

Windows 2003 Server, Microsoft Initiatives

Windows 9x

locking down, Fundamental Lockdown Principles

WindowsIdentity objects, The Identity and Principal Objects, Chapter 2: Role-Based Authorization

WindowsPrincipal objects, Chapter 2: Role-Based Authorization

WMI (Windows Management Instrumentation)

purpose of, Windows Management Instrumentation, Securing Web Services

WMI Web services example, Securing Web Services

WS-Security, Global XML Architecture

W3SVC service, Turn Off Unnecessary Services




Security for Microsoft Visual Basic  .NET
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net