Hacking the Code ASP.NET Web Application Security [Electronic resources]

James C. Foster, Mark M. Burnett

نسخه متنی -صفحه : 96/ 95
نمايش فراداده

List of Tables

Chapter 1: Managing Users

Table 1.1: Secret Questions and Ranges of Answers

Chapter 2: Authenticating and Authorizing Users

Table 2.1: Authentication Types with Associated Principal and Identity Objects

Chapter 3: Managing Sessions

Table 3.1: Enabling View State

Chapter 4: Encrypting Private Data

Table 4.1: Encryption Algorithms Available with the .NET Framework

Table 4.2: .NET Framework Symmetric Encryption Algorithms

Table 4.3: Hashing Algorithms Available in the .NET Framework

Chapter 5: Filtering User Input

Table 5.1: HttpRequest Class and HTTP Elements

Table 5.2: ASP.NET Validator Controls

Table 5.3: Regular Expression Patterns for Filtering Input

Table 5.5: Example HTML Character Entity Encoding

Table 5.6: IIS 6 Registry Settings to Limit Request Length Registry Key: HKLM/CurrentControlSet/Services/HTTP/Parameters

Table 5.7: IIS 6 Registry Settings to Restrict Characters Registry Key: HKLM/CurrentControlSet/Services/HTTP/Parameters

Appendix A: Understanding .NET Security

Table A.1: The Available Default Types of Evidence

Table A.2: Default Membership Conditions for Code Groups

Table A.3: The Default Permission Classes Derived from the CodeAccessPermission Class

Table A.4: Command-Line Security Tools