N
- named-pipes, Step 4: Design a Secure Architecture
- Napster, Turn Off Unnecessary Sharing
- .NET Framework, Deploying .NET Security Policy Updates, Deploy .NET Enterprise Security Policy Updates, Remove Samples, Locking Down .NET
- Configuration tool, Deploy .NET Enterprise Security Policy Updates
- locking down, Remove Samples
- security policy updates, Deploying .NET Security Policy Updates
- service packs, Locking Down .NET
- Netcat, Testing Tools
- NetMon, Testing Tools
- Netscape browsers, Windows Integrated Security Authentication
- network bandwidth starvation attacks, Denial of Service Attacks
- network firewalls, Step 8: No Back Doors (see )
- network redirection tools, Testing Tools
- network shares, Run Your Code in Different Security Zones, Run Your Code in Different Security Zones, What Code-Access Security Is Meant To Protect, How Visual Basic .NET Determines Zone
- file access, code-based, Run Your Code in Different Security Zones
- goals of code-access security, What Code-Access Security Is Meant To Protect
- Local Intranet zone default, How Visual Basic .NET Determines Zone
- simulating on single computers, Run Your Code in Different Security Zones
- networks, How Visual Basic .NET Determines Zone, Where Exceptions Occur, Step 4: Design a Secure Architecture
- exceptions arising from, Where Exceptions Occur
- intranets, Step 4: Design a Secure Architecture (see )
- zones in, How Visual Basic .NET Determines Zone (see )
- news groups, monitoring, Early Detection
- no-touch deployment, XCopy Deployment, Cabinet-File Deployment, Deploy and Run Your Application in the .NET Security Sandbox, When to Use Authenticode Signing, Step 10: Design for Maintenance
- Authenticode, When to Use Authenticode Signing
- overview, XCopy Deployment
- sandbox, Deploy and Run Your Application in the .NET Security Sandbox
- upgrades using, Step 10: Design for Maintenance
- when to use, Cabinet-File Deployment
- non-canonical filenames, File-Based or Directory-Based Attacks
- nonrepudiation, Identify Threats
- nonuser input, Don’t Rely on Data Sent to the Client
- NTFS file system, "I’m Already Protected. I’m Using a Firewall.", Automated Tools
- numeric input, validating, General Language Validation Tools
- NUnit, Automated Unit Testing, Testing Tools
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.