Index - Hacking the Code ASP.NET Web Application Security [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Hacking the Code ASP.NET Web Application Security [Electronic resources] - نسخه متنی

James C. Foster, Mark M. Burnett

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید






Index

I


identity objects, 87, 88, 89, 387

identity theft, educating users, 42–44

idle accounts, 16–18

imperative security, 100–101, 372–373

information leakage

and asymmetric cryptography, 177–178

building login forms, 55–57

connecting to data sources, 274–279

creating random numbers, 187–188

defined, 54, 207, 262, 310

designing secure tokens, 113–117

encrypting XML data, 333–348

ensuring last privilege for databases, 270–272

and hashing algorithms, 179–186

keeping memory clean, 188–190

preventing leaks, 314–315

preventing SQL injection, 280–291

protecting communications with SSL, 196–198

protecting cookies, 124–131

protecting secrets, 190–195

reporting and logging rrors, 322–326

and structured error handling, 318–322

and symmetric cryptography, 156–177

token threats, 112

using forms authentication, 58–65

and View State feature, 131–135

Windows authentication, 65–75

writing secure SQL code, 291–296

initialization vectors (IVs), 170, 173–176

input filtering, 206–207

input sources, identifying manipulations, 207–211, 251, 254

integrated Windows authentication, 68–69

Internet Information Services (IIS)

configuring to minimize file system attacks, 259

double decoding vulnerability, 237–239

hardening server applications, 248–250

locking down application file system access, 297–298

and ODBC, 268

registry settings to limit allowed characters, 249–250

registry settings to limit request length, 249

intranet code modules, limiting access to, 246

intrusion detection, role of honey pots, 241–243

involving users, 44–45, 52

IPSec, and rule of least privilege, 272

ISAM (indexed sequential access method)

and Jet drivers, 268–269

isolated storage, 192–194

Isolated Storage utility, 417

IsolatedStorageFilePermission class, 374

IsPersistent property, Ticket class, 129

IsSemiWeakKey method, 161, 162

IsWeakKey method, 161–162

/ 96