Hacking the Code ASP.NET Web Application Security [Electronic resources]

James C. Foster, Mark M. Burnett

نسخه متنی -صفحه : 96/ 80
نمايش فراداده

Index

L

layers, encryption, 167–169

least privilege principle

ensuring for databases, 270–272

overview, 247–248

restricting database users, 289–290

.licx files, 63

list of techniques, 218–219

locking accounts against brute-force attacks, 79–81

logging errors, 324–325

logic errors, 317, 318

login forms

building, 55–58

protecting, 55–57

lost passwords, resetting, 28–42