D

data access security, Logical Tiers, Physical Deployment Models, Implementation Technologies, More Information, Gatekeepers and Gates, Enterprise Services (COM+) Roles, Web Server to Remote Application Server, Intranet Security, Data Access Security, Data Access Security, SQL Server Gatekeepers, SQL Server Gatekeepers, Trusted Subsystem vs. Impersonation/Delegation, Authorization, Using Multiple Database Roles, Connecting with Least Privilege, The Database Trusts Different Roles, Storing Database Connection Strings Securely, Using the COM+ Catalog, SQL Injection Attacks, Auditing, Auditing
auditing, Auditing
authentication, More Information, Trusted Subsystem vs. Impersonation/Delegation
authorization, Authorization
creating least privileged accounts, The Database Trusts Different Roles
Data Services layer, Logical Tiers
gates, Gatekeepers and Gates
intranet., Intranet Security (see )
key issues, Data Access Security
least privileged connections, Connecting with Least Privilege
process identity for SQL Server, Auditing
secure communication, Web Server to Remote Application Server, Using Multiple Database Roles
SQL injection attacks, SQL Injection Attacks
SQL Server gatekeepers, SQL Server Gatekeepers
SQL Server roles, Enterprise Services (COM+) Roles
storing connection strings, Storing Database Connection Strings Securely
technologies, Implementation Technologies
trusted subsystem vs. impersonation/delegation, SQL Server Gatekeepers
validating user credentials against database stores, Using the COM+ Catalog
Web servers and, Physical Deployment Models
Data Encryption Standard (DES), Using Forms Authentication in a Web Farm, How To: Create an Encryption Library
data integrity, Authorization, Secure Communication, Using Multiple Database Roles, How To: Call a Web Service Using SSL, How To: Use IPSec to Provide Secure Communication Between Two Servers, Certificate Stores
(see also )
Data Services layer, Logical Tiers
data stores., Keys and Certificates (see )
data, sensitive., Secure Communication (see )
database connection strings., Modify the Web Application to Read an Encrypted Connection String from Web.Config (see )
database resources, Authentication and Authorization Design
database servers., The Foundations, Web Server to Remote Application Server, Security Configuration Steps, Connection String Types
(see also )
authentication, The Foundations
intranet configuration, Security Configuration Steps
secure communication from application servers to, Web Server to Remote Application Server
database trust, Connecting with Least Privilege
database, user account, Connection String Types (see )
db_owner role, Connection String Types, Connecting with Least Privilege, Additional Best Practices
DCOM (Distributed COM), Secure Communication, Using IPSec, Analysis, Security Architecture, Development Time vs. Deployment Time Configuration, Use Windows Groups, More Information, Authentication
authentication levels, Development Time vs. Deployment Time Configuration, Use Windows Groups, Authentication
Enterprise Services and, Security Architecture
firewalls and, More Information
Internet scenario and, Analysis
RPC encryption and, Secure Communication, Using IPSec
declarative principal permission demands, Programmatic Security, Configurable Security, Programmatic Security, Configurable Security, Configurable Security
declarative role checks, Checking Role Membership
decryption., Keys and Certificates (see , , )
decryptionKey attribute, Using Forms Authentication in a Web Farm
default configuration, ASP.NET, Implementing Mirrored ASPNET Process Identity
default credentials, Passing Credentials for Authentication to Web Services, Flowing the Original Caller, Accessing Network Resources, Flowing the Original Caller
default domain, Basic Authentication
default security settings, Design Principles
delegation., Authentication, Choose the Identities Used for Resource Access, Disadvantages of the Trusted Subsystem Model, Disadvantages of the Trusted Subsystem Model
(see also )
authentication and, Choose the Identities Used for Resource Access
impersonation and, Disadvantages of the Trusted Subsystem Model
(see also )
Kerberos., Authentication (see )
demilitarized zone (DMZ), Physical Deployment Models, Key Notes
deployment, Physical Deployment Models, Know What to Secure, Development Time vs. Deployment Time Configuration, Versioning
configuration upon, Development Time vs. Deployment Time Configuration
serviced component, Versioning
Web application, Physical Deployment Models, Know What to Secure
DES (Data Encryption Standard), Using Forms Authentication in a Web Farm, How To: Create an Encryption Library
design principles, Design Principles
development time configuration, Development Time vs. Deployment Time Configuration
Digest authentication, Authentication, ASP.NET Identity Matrix
digests, password, How To: Use Forms Authentication with SQL Server 2000
directory traversal bugs, Options for Storing Secrets in ASP.NET
directory, active., How To: Implement Kerberos Delegation for Windows 2000 (see )
directory, virtual., Create a Simple Web Application (see )
distributed Web applications., Security Model for ASP.NET Applications (see )
DLL locking problems, RPC Encryption
Dllhost.exe, Security Architecture, Identifying Callers
DllImport attribute, Flowing the Original Caller
DMZ (demilitarized zone), Physical Deployment Models, Key Notes
domain accounts, More Information, Using the ASP.NET Process Identity
anonymous, More Information
custom, Using the ASP.NET Process Identity
domain controllers, ASP.NET process account and, Avoid Running as SYSTEM
domain, default, Basic Authentication
double dash (--), Anatomy of a SQL Script Injection Attack
downloading of files, preventing, Locking Configuration Settings
DPAPI (Data Protection API), Options for Storing Secrets in ASP.NET, Web Farm Considerations, Storing Database Connection Strings Securely, Storing Database Connection Strings Securely, Storing Database Connection Strings Securely, Machine Store vs. User Store, Using DPAPI from Enterprise Services, How To: Create a DPAPI Library, How To: Create a DPAPI Library, How To: Use DPAPI (Machine Store) from ASP.NET, How To: Use DPAPI (User Store) from ASP.NET with Enterprise Services
libraries., How To: Create a DPAPI Library (see )
LSA vs., Storing Database Connection Strings Securely
machine store vs. user store, Storing Database Connection Strings Securely, How To: Create a DPAPI Library
storing database connection strings using, Storing Database Connection Strings Securely
storing secrets, Options for Storing Secrets in ASP.NET
Web farms and, Web Farm Considerations
with machine store, Using DPAPI from Enterprise Services, How To: Use DPAPI (Machine Store) from ASP.NET
with user store, Machine Store vs. User Store, How To: Use DPAPI (User Store) from ASP.NET with Enterprise Services
DPAPI libraries, How To: Create a DPAPI Library, How To: Create a DPAPI Library, Notes, Notes, Create a C# Class Library, Create a Serviced Component that Provides Encrypt and Decrypt Methods
calling managed, Create a Serviced Component that Provides Encrypt and Decrypt Methods
creating C# class library, Notes
issues, How To: Create a DPAPI Library
requirements, Notes
strong naming assemblies, Create a C# Class Library
duplicated accounts, Intranet Security, Extranet Security, Internet Security
dynamic cloaking, Impersonation
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.226.185.87