P

packet sniffing tools, Securing Web Applications
Page objects, IsValid property, Validation Tools Available to ASP.NET Web Applications
Page_Load events, Install the Passport SDK, How SSL Works
Params collection, Parse Method, Review Code for Threats
Parse method, General Language Validation Tools
partially trusted DLLs, Strong Names vs. Weak Names
passphrases, Keeping Private Keys Safe
Passport authentication, Role-Based Authorization, ASP.NET Authentication, Passport Authentication, Passport Authentication, Passport Authentication, Passport Authentication, Passport Authentication, Passport Authentication, Passport Authentication, Passport Authentication, Passport Authentication, Passport Authentication, Passport Authentication, Install the Passport SDK, Install the Passport SDK, Install the Passport SDK, Install the Passport SDK, Install the Passport SDK, Install the Passport SDK, Install the Passport SDK, Install the Passport SDK, Install the Passport SDK, Install the Passport SDK, Install the Passport SDK, Install the Passport SDK
Administration Utility, Install the Passport SDK
advantages, Passport Authentication
best use, Install the Passport SDK
client setup, Passport Authentication
creating the application, Install the Passport SDK
defined, ASP.NET Authentication
encryption key, Install the Passport SDK
fields for new applications, Install the Passport SDK
live environment restoration, Install the Passport SDK
MSN Messenger, Passport Authentication
Page_Load handler, Install the Passport SDK
passport, acquiring, Passport Authentication
PassportIdentity object, Role-Based Authorization, Passport Authentication
preproduction environment, Passport Authentication
preproduction passport signup, Install the Passport SDK
process, Passport Authentication
purpose, Passport Authentication
registering new applications, Install the Passport SDK
SDK installation, Passport Authentication
server configuration, Install the Passport SDK
SiteID, obtaining, Install the Passport SDK
soft sign-ins, Install the Passport SDK
steps for implementing, Passport Authentication
switching environments, Passport Authentication
password-cracking attacks, Mitigating Threats
PasswordChar property of TextBox, Direct User Input
passwords, Hash Digests, Hash Digests, Hash Digests, Public Key Encryption, Hiding Unnecessary Information, Hiding Unnecessary Information, Security Zones and Permissions, Create a Blueprint of Your Application, Testing Tools, Fundamental Lockdown Principles, Turn Off Unnecessary Sharing, Turn Off Unnecessary Sharing, SQL Server Authentication, Microsoft Access Authentication and Authorization, Locking Down SQL Server, Mitigating Threats, Mitigating Threats, Microsoft Initiatives
Access database authentication, Microsoft Access Authentication and Authorization
authenticating, Hiding Unnecessary Information
BIOS, Turn Off Unnecessary Sharing
blank, Security Zones and Permissions, SQL Server Authentication
constants, stored as, Create a Blueprint of Your Application
hash digests, Hash Digests
hiding entry, Hiding Unnecessary Information
IIS version 6.0, Microsoft Initiatives
mitigating threats, Mitigating Threats
removing fields from databases, Public Key Encryption
screen saver, Turn Off Unnecessary Sharing
SQL Server, Locking Down SQL Server
strong, Fundamental Lockdown Principles
time-outs for accepting, Mitigating Threats
tools for cracking, Testing Tools
unencrypted, dangers, Hash Digests
verifying with hash digests, Hash Digests
patches, Fundamental Lockdown Principles, Named-Pipes vs. TCP-IP, The Arms Race of Hacking
not installing, reasons, The Arms Race of Hacking
OS security, Fundamental Lockdown Principles
recommended, Named-Pipes vs. TCP-IP
paths, File-Based or Directory-Based Attacks, Enforce Canonical Filenames, Child-Application Attacks
GetFullPath method, Enforce Canonical Filenames
noncanonical, File-Based or Directory-Based Attacks
parsing in Windows, Child-Application Attacks
PEAP (Protected Extensible Authentication Protocol), Microsoft Initiatives
people as a design challenge, Design Challenges
PerformanceCounterPermission, Security Zones and Permissions
permissions, What Code-Access Security Is Meant To Protect, Security Zones and Trust Levels, Security Zones and Permissions, Security Zones and Permissions, Security Zones and Permissions, Security Zones and Permissions, Security Zones and Permissions, Local Intranet, Internet, and Trusted Sites Zones, Ensuring That Your Code Will Run Safely, Example: Create a Test Tool for Testing Web Applications, Deploying .NET Security Policy Updates, Update .NET Enterprise Security Policy, Update .NET Enterprise Security Policy, Update .NET Enterprise Security Policy, SQL Server Authorization, Microsoft Access User-Level Security Models, Locking Down SQL Server
code-access, Security Zones and Permissions (see )
evidence, Update .NET Enterprise Security Policy
full, granting, Security Zones and Permissions, Update .NET Enterprise Security Policy
Local Intranet zone, Security Zones and Permissions
Microsoft Access, Microsoft Access User-Level Security Models
modifying policy, Ensuring That Your Code Will Run Safely
policy manager, Update .NET Enterprise Security Policy
purpose, What Code-Access Security Is Meant To Protect
security policy attributes, table, Deploying .NET Security Policy Updates
security zones, granting, Security Zones and Trust Levels
SQL Server, SQL Server Authorization, Locking Down SQL Server
testing for appropriate, Example: Create a Test Tool for Testing Web Applications
trust level defaults, Security Zones and Permissions
Trusted Sites zone, Security Zones and Permissions
version differences, Local Intranet, Internet, and Trusted Sites Zones
physical security, locking down, "I’m Already Protected. I’m Using a Firewall."
plain text, Encryption
planning, Testing for Attack-Resistant Code, Filter and Prioritize Tests for Each Scenario, Prepare for a Response, Prioritize Analysis Based on the Function of Each Component
response plans for attacks, Prepare for a Response
testing, Testing for Attack-Resistant Code, Filter and Prioritize Tests for Each Scenario
threat analysis, Prioritize Analysis Based on the Function of Each Component
policy manager, Update .NET Enterprise Security Policy
ports, Step 8: No Back Doors
posing as users attacks, Mitigating Threats
practice files for chapters, Encryption, Guide to the Code Samples
Principal, Role-Based Authorization
principle of least privilege, Role-Based Authorization
printing, permission for, Security Zones and Permissions, Local Intranet, Internet, and Trusted Sites Zones
prioritizing threats, Identify Threats
privacy, What Happens Next?
private key encryption, Hash Digests, Private Key Encryption, Private Key Encryption, Private Key Encryption, Private Key Encryption, Private Key Encryption, Keeping Private Keys Safe, Keeping Private Keys Safe, Keeping Private Keys Safe, Keeping Private Keys Safe, Keeping Private Keys Safe, Keeping Private Keys Safe, Keeping Private Keys Safe, Public Key Encryption, Secure Sockets Layer, Contents of SecurityLibrary.vb
applications, Private Key Encryption
brute force attacks, Keeping Private Keys Safe
decryption function, Private Key Encryption
defined, Hash Digests
DES, Private Key Encryption (see )
directory security, Keeping Private Keys Safe
encrypting keys, Keeping Private Keys Safe
export restrictions, Public Key Encryption
function, creating, Private Key Encryption, Contents of SecurityLibrary.vb
installation issues, Keeping Private Keys Safe
login credentials as keys, Keeping Private Keys Safe
safety of keys, Keeping Private Keys Safe
SSL, Secure Sockets Layer
storing data with, Private Key Encryption
storing keys safely, Keeping Private Keys Safe
privileges, Role-Based Authorization, Code-Access Security, SQL-Injection Attacks, Child-Application Attacks, Example: Create a Test Tool for Testing Web Applications, Fundamental Lockdown Principles, Determining Who Is Logged On
child-application attacks, effects, Child-Application Attacks
elevating, attack by, Code-Access Security
least, principle, Role-Based Authorization, SQL-Injection Attacks, Fundamental Lockdown Principles
SQL Server, Determining Who Is Logged On
testing for appropriate, Example: Create a Test Tool for Testing Web Applications
profiling, Plan of Attack—The Test Plan, Testing Tools
Protected Extensible Authentication Protocol (PEAP), Microsoft Initiatives
PSNs (Processor serial numbers), Privacy vs. Security
public function vulnerability, Create a Blueprint of Your Application, Mitigating Threats, Review Code for Threats
public key encryption, Keeping Private Keys Safe, Keeping Private Keys Safe, Keeping Private Keys Safe, Public Key Encryption, Public Key Encryption, Public Key Encryption, DPAPI Encryption
defined, Keeping Private Keys Safe
functions for, creating, Public Key Encryption, DPAPI Encryption
private key component of, Keeping Private Keys Safe
purpose of, Keeping Private Keys Safe
RSA algorithm for, Public Key Encryption
slowness of, Public Key Encryption
Public keyword, Create a Blueprint of Your Application, Mitigating Threats, Review Code for Threats
publisher identity security policy attribute, Update .NET Enterprise Security Policy
PWDump, Testing Tools
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.168.211