Security for Microsoft Visual Basic .NET

B

back doors

eliminating, Step 8: No Back Doors

locking down, Fundamental Lockdown Principles

backing up servers

importance of, Fundamental Lockdown Principles

bandwidth startvation attacks, Table 6-1: Forms of DoS Attacks

Big Brother systems, Privacy vs. Security

binaries, scanning, Take the Attacker’s View

BIOS passwords, Implement BIOS Password Protection

blueprints of applications, Take the Attacker’s View, Create a Blueprint of Your Application

browsers

hidden field vulnerability, Create Scenarios Based on Inroads for Attack

brute force attacks, Keeping Private Keys Safe

budget limitations, Design Challenges

buffer overrun attacks, Buffer Overrun

buffer overruns

Slammer worm, The Arms Race of Hacking

SQL Server 2000 vulnerability to, The Arms Race of Hacking

bugs, Web security, Is It a Bug, or an Attack from a Criminal Mastermind?

builds

Authenticode with, Incorporate Authenticode Signing in Your Build Process

bypassing UI attack, Table 14-2: Example of Common Attacks and Techniques to Mitigate Them

Категории