Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: Encryption
How Does a Hash Digest Work?
Export Restrictions on Encryption
Chapter 2: Role-Based Authorization
The Identity and Principal Objects
Searching Active Directory
Chapter 3: Code-Access Security
OS Security Restrictions Preempt Everything
The Luring Attack
Chapter 4: ASP.NET Authentication
Anonymous Requests
Chapter 5: Securing Web Applications
Is It a Bug, or an Attack from a Criminal Mastermind?
Global XML Architecture
Windows Management Instrumentation
Chapter 6: Application Attacks and How to Avoid Them
Buffer Overrun
Chapter 7: Validating Input
Web-Based Input Attacks and SSL
Chapter 8: Handling Exceptions
Try…Catch
or
On Error GoTo
Viewing the Event Log Remotely
Chapter 10: Securing Your Application for Deployment
Delay Signing—Securing Your Build Process
Chapter 14: Threats—Analyze, Prevent, Detect, and Respond
STRIDE—Categorizing Threats
Previous page
Table of content
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
Reverse Engineering and Importing to ORM
Conceptual Model Reports
Editing Logical Models”Intermediate Aspects
Logical Database Model Reports
Building Web Applications with UML (2nd Edition)
Scripting
Discussion
Security Strategies
Overview of Software Development
Advanced Design
MySQL Clustering
Before You Begin with MySQL Cluster
Using Multiple Management Nodes
Running MySQL in a Chrooted Environment
Network Redundancy
Individual Programs
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Credibility and Computers
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Captology Looking Forward
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Handling WMI Events
The WMI Schema
WMI Security
.NET-A Complete Development Cycle
Our First .NET Application
References for Further Reading
Design of the Advanced GDI+ Extensions
Implementing Dynamically Loadable Image Postprocessing Plugins
Secure Web Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies