M
- maintenance, Fundamental Lockdown Principles, Design Challenges, Step 10: Design for Maintenance, Step 10: Design for Maintenance, Step 10: Design for Maintenance, Step 10: Design for Maintenance, Step 10: Design for Maintenance
- application upgrades, Step 10: Design for Maintenance
- challenges, Design Challenges
- designing for, Step 10: Design for Maintenance
- hotfixes, Step 10: Design for Maintenance
- importance, Fundamental Lockdown Principles
- off switch design, Step 10: Design for Maintenance
- service packs, Step 10: Design for Maintenance
- managed code, Microsoft Initiatives
- manual testing, Testing Approaches
- MaxLength property of TextBox, Direct User Input
- MBSA (Microsoft Baseline Security Analyzer), Fundamental Lockdown Principles, Automated Tools, Automated Tools, Enable Auditing, Remove Samples
- auto logon detection, Automated Tools
- client services, detecting unnecessary, Enable Auditing
- IIS sample site detection, Remove Samples
- NTFS detection, Automated Tools
- overview, Fundamental Lockdown Principles
- Medium Trust security level, Run Your Code in Different Security Zones, Security Zones and Trust Levels, Cooperating with the Security System
- effects of, Run Your Code in Different Security Zones
- permissions with, Security Zones and Trust Levels
- setting to, Cooperating with the Security System
- memory starvation attacks, Application Attacks and How to Avoid Them, Defensive Techniques for DoS Attacks
- MessageQueuePermission, Security Zones and Permissions
- Microsoft .NET Passport Security, Install the Passport SDK (see )
- Microsoft Access, SQL Server Authorization (see )
- Microsoft Application Center Test (ACT), Stress Testing, Testing Tools
- Microsoft Group Policy, Deploy .NET Enterprise Security Policy Updates
- Microsoft Internet Explorer, Security Zones and Trust Levels (see )
- Microsoft Security Baseline Analyzer, Automated Tools (see )
- Microsoft security initiatives, Assuming Third-Party Components Are Safe, The IPv6 Internet Protocol
- Microsoft SQL Server Profiler, Testing Tools
- Microsoft Systems Management Server (SMS), Deploy .NET Enterprise Security Policy Updates
- Microsoft Trustworthy Computing initiative, Assuming Third-Party Components Are Safe, Microsoft Initiatives
- Microsoft Visual Studio .NET Deployment Wizard, XCopy Deployment
- Microsoft Windows, Prioritize Threats (see specific versions of Windows)
- mitigating threats, Prioritize Threats
- Mitnick, Kevin, Threats—Analyze, Prevent, Detect, and Respond
- Mixed Mode SQL Server authentication, SQL Server Authentication
- MkDir keyword, Review Code for Threats
- money limitations, Ten Steps to Designing a Secure Enterprise System
- MSFTPSVC service, Enable Auditing
- MSN Messenger, Passport Authentication
- multiuser conflicts, Handling Exceptions
- My Computer zone, Security Zones and Trust Levels, Security Zones and Permissions, Security Zones and Permissions, Deploy and Run Your Application in the .NET Security Sandbox
- defined, Security Zones and Trust Levels
- Full Trust permissions, Security Zones and Permissions
- permissions, Security Zones and Permissions
- sandbox, outside of, Deploy and Run Your Application in the .NET Security Sandbox
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.