Programming .Net Security

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

hacker, roles 

hardware, resource restrictions 

Hash class 

hash codes  [See also hashing algorithms]

    cryptography 

    digital signatures 

    generating

        from data in memory 

        from streamed data 

    keys 

    parsing 

    validating 

hash functions, cryptography 

HashAlgorithm class

    methods and properties 

HashCore method, implementing 

HashFinal method, implementing 

hashing algorithms 

    abstract classes 

    extending .NET Framework 

    generating

        from data in memory 

        from streamed data 

    hash codes

        creating 

        lengths of 

    implementation classes 

        testing 

    Initialize method 

    instantiating 

    keyed 

        block cypher hash codes 

        creating 

        HMAC standard 

        .NET Framework 

    KeyedHashAlgorithm class

        creating keyed hash codes 

        instantiating 

    message size limits 

    .NET Framework 

    programming considerations 

HashSize property, implementing 

HMAC standard (keyed hashing algorithms) 

HMACSHA1 algorithm 

host evidence 

    ControlEvidence permission 

hostEvidence argument, Evidence class 

Категории