Security for Microsoft Visual Basic .NET

U

UIPermission, Table 3-2: Permissions for Each Zone, Table 3-4: Permissions for Local Intranet and Trusted Sites Zones

unified systems, What Happens Next?

Unix vulnerabilities, No Operating System Is Safe

Untrusted Sites zone

defined, Security Zones and Trust Levels

permissions, Security Zones and Permissions

scope of, How Visual Basic .NET Determines Zone

upgrades

no-touch deployment, Step 10: Design for Maintenance

URL-based attacks, Create Scenarios Based on Inroads for Attack

URLScan, Automated Tools, Install URLScan

architecture, place in, Step 4: Design a Secure Architecture

recommended, If You Do Nothing Else…

usability, Step 7: Design for Simplicity and Usability

user names

Identity objects containing, The Identity and Principal Objects

limiting length of, Validate Input Parameters

testing evaluation, Generate Tests

unrecognized, attempts with, Early Detection

users

designing for, Step 7: Design for Simplicity and Usability

Категории