Dead-end pages

From Guidance Share

Jump to: navigation, search

Showing below up to 500 results starting with #1.
View (previous 500) (next 500) (20 | 50 | 100 | 250 | 500).

  1. .NET 2.0 Performance Guidelines - Arrays
  2. .NET 2.0 Performance Guidelines - Asynchronous
  3. .NET 2.0 Performance Guidelines - Boxing and Unboxing
  4. .NET 2.0 Performance Guidelines - Code Access Security
  5. .NET 2.0 Performance Guidelines - Collections
  6. .NET 2.0 Performance Guidelines - Exception Management
  7. .NET 2.0 Performance Guidelines - Finalize and Dispose
  8. .NET 2.0 Performance Guidelines - Garbage Collection
  9. .NET 2.0 Performance Guidelines - Iterating and Looping
  10. .NET 2.0 Performance Guidelines - Locking and Synchronization
  11. .NET 2.0 Performance Guidelines - Ngen.exe
  12. .NET 2.0 Performance Guidelines - Pinning
  13. .NET 2.0 Performance Guidelines - Reflection and Late Binding
  14. .NET 2.0 Performance Guidelines - String Operations
  15. .NET 2.0 Performance Guidelines - Threading
  16. .NET 2.0 Performance Guidelines - What's New in 2.0
  17. .NET 2.0 Security Guidelines - APTCA
  18. .NET 2.0 Security Guidelines - Assembly Design Guidelines
  19. .NET 2.0 Security Guidelines - Class Design Considerations
  20. .NET 2.0 Security Guidelines - Exception Management
  21. .NET 2.0 Security Guidelines - Strong Names
  22. .NET Framework 1.1 Performance Checklist
  23. .NET Framework 1.1 Performance Guidelines - Arrays
  24. .NET Framework 1.1 Performance Guidelines - Asynchronous
  25. .NET Framework 1.1 Performance Guidelines - Boxing and Unboxing
  26. .NET Framework 1.1 Performance Guidelines - Class Design Considerations
  27. .NET Framework 1.1 Performance Guidelines - Code Access Security
  28. .NET Framework 1.1 Performance Guidelines - Collections
  29. .NET Framework 1.1 Performance Guidelines - Exception Management
  30. .NET Framework 1.1 Performance Guidelines - Finalize and Dispose
  31. .NET Framework 1.1 Performance Guidelines - Garbage Collection
  32. .NET Framework 1.1 Performance Guidelines - Iterating and Looping
  33. .NET Framework 1.1 Performance Guidelines - Locking and Synchronization
  34. .NET Framework 1.1 Performance Guidelines - Ngen.exe
  35. .NET Framework 1.1 Performance Guidelines - Pinning
  36. .NET Framework 1.1 Performance Guidelines - Reflection and Late Binding
  37. .NET Framework 1.1 Performance Guidelines - String Operations
  38. .NET Framework 1.1 Performance Guidelines - Threading
  39. .NET Framework 1.1 Performance Guidelines - Working Set
  40. .NET Framework 1.1 Security Checklist
  41. .NET Framework 1.1 Security Guidelines - Assembly Design Considerations
  42. .NET Framework 1.1 Security Guidelines - Class Design Considerations
  43. .NET Framework 1.1 Security Guidelines - Cryptography
  44. .NET Framework 1.1 Security Guidelines - Delegates
  45. .NET Framework 1.1 Security Guidelines - Exception Management
  46. .NET Framework 1.1 Security Guidelines - File I/O
  47. .NET Framework 1.1 Security Guidelines - Obfuscation
  48. .NET Framework 1.1 Security Guidelines - Reflection
  49. .NET Framework 1.1 Security Guidelines - Registry
  50. .NET Framework 1.1 Security Guidelines - Serialization
  51. .NET Framework 1.1 Security Guidelines - Strong Names
  52. .NET Framework 1.1 Security Guidelines - Threading
  53. .NET Framework 1.1 Security Guidelines - Unmanaged Code
  54. .NET Framework 2.0 Performance Checklist
  55. .NET Framework 2.0 Performance Inspection Questions - Class Design Considerations
  56. .NET Framework 2.0 Performance Inspection Questions - Common Performance Issues
  57. .NET Framework 2.0 Performance Inspection Questions - Exception Handling
  58. .NET Framework 2.0 Performance Inspection Questions - Ngen.exe
  59. .NET Framework 2.0 Performance Inspection Questions - String Operations
  60. .NET Framework 2.0 Performance Inspection Questions - Threading
  61. .NET Framework 2.0 Performance Inspection Questions - Visual Basic Considerations
  62. .NET Framework 2.0 Security Checklist
  63. .NET Framework 2.0 Security Checklists
  64. .NET Framework 2.0 Security Guidelines - Communication Security
  65. .NET Framework 2.0 Security Guidelines - Cryptography
  66. .NET Framework 2.0 Security Guidelines - Data Access
  67. .NET Framework 2.0 Security Guidelines - Delegates
  68. .NET Framework 2.0 Security Guidelines - Event Log
  69. .NET Framework 2.0 Security Guidelines - File I/O
  70. .NET Framework 2.0 Security Guidelines - Obfuscation
  71. .NET Framework 2.0 Security Guidelines - Reflection
  72. .NET Framework 2.0 Security Guidelines - Registry
  73. .NET Framework 2.0 Security Guidelines - Sensitive Data
  74. .NET Framework 2.0 Security Guidelines - Serialization
  75. .NET Framework 2.0 Security Guidelines - Threading
  76. .NET Framework 2.0 Security Guidelines - Unmanaged Code
  77. .NET Framework 2.0 Security Inspection Questions - Auditing and Logging
  78. .NET Framework 2.0 Security Inspection Questions - Code Access Security
  79. .NET Framework 2.0 Security Inspection Questions - Cross-Site Scripting
  80. .NET Framework 2.0 Security Inspection Questions - Cryptography
  81. .NET Framework 2.0 Security Inspection Questions - Exception Management
  82. .NET Framework 2.0 Security Inspection Questions - Impersonation
  83. .NET Framework 2.0 Security Inspection Questions - Input and Data Validation
  84. .NET Framework 2.0 Security Inspection Questions - Multi-Threading
  85. .NET Framework 2.0 Security Inspection Questions - Potentially Dangerous Unmanaged APIs
  86. .NET Framework 2.0 Security Inspection Questions - SQL Injection
  87. .NET Framework 2.0 Security Inspection Questions - Sensitive Data
  88. .NET Framework 2.0 Security Inspection Questions - Unsafe Code
  89. .NET Framework 2.0 Security Inspection Questions - What's New in 2.0
  90. ADO.NET 1.1 Performance Checklist
  91. ADO.NET 1.1 Performance Guidelines - Binary Large Objects
  92. ADO.NET 1.1 Performance Guidelines - Commands
  93. ADO.NET 1.1 Performance Guidelines - Connections
  94. ADO.NET 1.1 Performance Guidelines - DataReader
  95. ADO.NET 1.1 Performance Guidelines - DataSet
  96. ADO.NET 1.1 Performance Guidelines - Design Considerations
  97. ADO.NET 1.1 Performance Guidelines - Exception Management
  98. ADO.NET 1.1 Performance Guidelines - Parameters
  99. ADO.NET 1.1 Performance Guidelines - Stored Procedures
  100. ADO.NET 1.1 Performance Guidelines - Transactions
  101. ADO.NET 1.1 Performance Guidelines - XML and DataSet Objects
  102. ADO.NET 1.1 Security Checklist
  103. ADO.NET 1.1 Security Guidelines - Authentication
  104. ADO.NET 1.1 Security Guidelines - Authorization
  105. ADO.NET 1.1 Security Guidelines - Configuration Management
  106. ADO.NET 1.1 Security Guidelines - Deployment Considerations
  107. ADO.NET 1.1 Security Guidelines - Design Considerations
  108. ADO.NET 1.1 Security Guidelines - Exception Management
  109. ADO.NET 1.1 Security Guidelines - Input Validation
  110. ADO.NET 1.1 Security Guidelines - Sensitive Data
  111. ADO.NET 2.0 Performance Checklist
  112. ADO.NET 2.0 Performance Guidelines - Binary Large Objects
  113. ADO.NET 2.0 Performance Guidelines - Commands
  114. ADO.NET 2.0 Performance Guidelines - Connections
  115. ADO.NET 2.0 Performance Guidelines - DataReader
  116. ADO.NET 2.0 Performance Guidelines - DataSet
  117. ADO.NET 2.0 Performance Guidelines - Design Considerations
  118. ADO.NET 2.0 Performance Guidelines - Exception Management
  119. ADO.NET 2.0 Performance Guidelines - New in 2.0
  120. ADO.NET 2.0 Performance Guidelines - Parameters
  121. ADO.NET 2.0 Performance Guidelines - Transactions
  122. ADO.NET 2.0 Performance Guidelines - XML and DataSet Objects
  123. ADO.NET 2.0 Security Checklists
  124. ADO.NET 2.0 Security Guidelines - Authentication
  125. ADO.NET 2.0 Security Guidelines - Authorization
  126. ADO.NET 2.0 Security Guidelines - Code Access Security Considerations
  127. ADO.NET 2.0 Security Guidelines - Configuration and Connection Strings
  128. ADO.NET 2.0 Security Guidelines - Deployment Considerations
  129. ADO.NET 2.0 Security Guidelines - Exception Management
  130. ADO.NET 2.0 Security Guidelines - Input / Data Validation
  131. ADO.NET 2.0 Security Guidelines - SQL Injection
  132. ADO.NET 2.0 Security Guidelines - Sensitive Data
  133. ASP.NET 1.1 - Enterprise Services to SQL Server
  134. ASP.NET 1.1 - Extranet Exposing a Web Application
  135. ASP.NET 1.1 - Extranet Exposing a Web Service
  136. ASP.NET 1.1 - Internet Web to SQL Server
  137. ASP.NET 1.1 - Intranet Web to Database
  138. ASP.NET 1.1 - Remote Enterprise Services to SQL Server
  139. ASP.NET 1.1 - Web Services to SQL Server
  140. ASP.NET 1.1 Performance Checklist
  141. ASP.NET 1.1 Performance Guidelines - Application State
  142. ASP.NET 1.1 Performance Guidelines - COM Interop
  143. ASP.NET 1.1 Performance Guidelines - Caching
  144. ASP.NET 1.1 Performance Guidelines - Data Access
  145. ASP.NET 1.1 Performance Guidelines - Data Binding
  146. ASP.NET 1.1 Performance Guidelines - Design Considerations
  147. ASP.NET 1.1 Performance Guidelines - Exception Management
  148. ASP.NET 1.1 Performance Guidelines - HTTP Modules
  149. ASP.NET 1.1 Performance Guidelines - Pages
  150. ASP.NET 1.1 Performance Guidelines - Resource Management
  151. ASP.NET 1.1 Security Checklist
  152. ASP.NET 1.1 Security Guidelines - Auditing and Logging
  153. ASP.NET 1.1 Security Guidelines - Authentication
  154. ASP.NET 1.1 Security Guidelines - Authorization
  155. ASP.NET 1.1 Security Guidelines - Cross-Site Scripting
  156. ASP.NET 1.1 Security Guidelines - Design Considerations
  157. ASP.NET 1.1 Security Guidelines - Exception Management
  158. ASP.NET 1.1 Security Guidelines - Impersonation
  159. ASP.NET 1.1 Security Guidelines - Input Validation
  160. ASP.NET 1.1 Security Guidelines - Parameter Manipulation
  161. ASP.NET 1.1 Security Guidelines - Sensitive Data
  162. ASP.NET 1.1 Security Guidelines - Session Management
  163. ASP.NET 2.0 Internet - Forms Authentication to SQL, Roles in SQL
  164. ASP.NET 2.0 Intranet - Forms Authentication to AD, Roles in AD
  165. ASP.NET 2.0 Intranet - Windows Auth to AD Groups
  166. ASP.NET 2.0 Intranet - Windows Authentication, Roles in AD
  167. ASP.NET 2.0 Intranet - Windows Authentication, SQL Roles
  168. ASP.NET 2.0 Performance Checklist
  169. ASP.NET 2.0 Performance Guidelines - Application State
  170. ASP.NET 2.0 Performance Guidelines - COM Interop
  171. ASP.NET 2.0 Performance Guidelines - Caching
  172. ASP.NET 2.0 Performance Guidelines - Data Access
  173. ASP.NET 2.0 Performance Guidelines - Data Binding
  174. ASP.NET 2.0 Performance Guidelines - Deployment Considerations
  175. ASP.NET 2.0 Performance Guidelines - Design Considerations
  176. ASP.NET 2.0 Performance Guidelines - Exception Management
  177. ASP.NET 2.0 Performance Guidelines - HTTP Modules
  178. ASP.NET 2.0 Performance Guidelines - Pages
  179. ASP.NET 2.0 Performance Guidelines - Resource Management
  180. ASP.NET 2.0 Performance Guidelines - Security Considerations
  181. ASP.NET 2.0 Performance Guidelines - Server Controls
  182. ASP.NET 2.0 Performance Guidelines - Session State
  183. ASP.NET 2.0 Performance Guidelines - State Management
  184. ASP.NET 2.0 Performance Guidelines - String Management
  185. ASP.NET 2.0 Performance Guidelines - Threading
  186. ASP.NET 2.0 Performance Guidelines - View State
  187. ASP.NET 2.0 Performance Inspection Questions - Data Access
  188. ASP.NET 2.0 Performance Inspection Questions - Machine.config
  189. ASP.NET 2.0 Security Checklists
  190. ASP.NET 2.0 Security Guidelines - Auditing and Logging
  191. ASP.NET 2.0 Security Guidelines - Authorization
  192. ASP.NET 2.0 Security Guidelines - Code Access Security
  193. ASP.NET 2.0 Security Guidelines - Communication Security
  194. ASP.NET 2.0 Security Guidelines - Data Access
  195. ASP.NET 2.0 Security Guidelines - Deployment Considerations
  196. ASP.NET 2.0 Security Guidelines - Exception Management
  197. ASP.NET 2.0 Security Guidelines - Forms Authentication
  198. ASP.NET 2.0 Security Guidelines - Impersonation/Delegation
  199. ASP.NET 2.0 Security Guidelines - Input/Data Validation
  200. ASP.NET 2.0 Security Guidelines - Parameter Manipulation
  201. ASP.NET 2.0 Security Guidelines - Sensitive Data
  202. ASP.NET 2.0 Security Guidelines - Session Management
  203. ASP.NET 2.0 Security Guidelines - Windows Authentication
  204. ASP.NET 2.0 Security Inspection Questions - Auditing and Logging
  205. ASP.NET 2.0 Security Inspection Questions - Authorization
  206. ASP.NET 2.0 Security Inspection Questions - Code Access Security
  207. ASP.NET 2.0 Security Inspection Questions - Cross-Site Scripting
  208. ASP.NET 2.0 Security Inspection Questions - Cryptography
  209. ASP.NET 2.0 Security Inspection Questions - Data Access
  210. ASP.NET 2.0 Security Inspection Questions - Exception Management
  211. ASP.NET 2.0 Security Inspection Questions - Forms Authentication
  212. ASP.NET 2.0 Security Inspection Questions - Impersonation
  213. ASP.NET 2.0 Security Inspection Questions - Input and Data Validation
  214. ASP.NET 2.0 Security Inspection Questions - Potentially Dangerous Unmanaged APIs
  215. ASP.NET 2.0 Security Inspection Questions - SQL Injection
  216. ASP.NET 2.0 Security Inspection Questions - Sensitive Data
  217. ASP.NET 2.0 Security Inspection Questions - Unsafe Code
  218. ASP.NET 2.0 Security Inspection Questions - What's New in 2.0
  219. ASP.NET 2.0 Security Practices - Auditing and Logging
  220. ASP.NET 2.0 Security Practices - Authorization
  221. ASP.NET 2.0 Security Practices - Code Access Security
  222. ASP.NET 2.0 Security Practices - Configuration
  223. ASP.NET 2.0 Security Practices - Data Access
  224. ASP.NET 2.0 Security Practices - Impersonation and Delegation
  225. ASP.NET 2.0 Security Practices - Input and Data Validation
  226. ASP.NET 2.0 Security Practices - Secure Communication
  227. ASP.NET 2.0 Security Practices - What's New in 2.0
  228. ASP.NET 2.0 Security Questions and Answers - Authentication
  229. ASP.NET 2.0 Security Questions and Answers - Configuration
  230. ASP.NET 2.0 Security Questions and Answers - Impersonation / Delegation
  231. ASP.NET 2.0 Security Questions and Answers - Others
  232. ASP.NET Security Inspection Questions - Authentication
  233. About
  234. Actors, Personas, and Roles
  235. Agile Architecture Method Explained - Chapter 1 - Agile Architecture Method
  236. Agile Architecture Method Explained - Chapter 2 - Step 1: Identify Architecture Objectives
  237. Agile Architecture Method Explained - Chapter 3 - Step 2: Identify Key Scenarios
  238. Agile Architecture Method Explained - Chapter 4 - Step 3: Application Overview
  239. Agile Architecture Method Explained - Chapter 5 - Step 4: Key Hot Spots
  240. Agile Architecture Method Explained - Chapter 6 - Step 5: Candidate Solutions
  241. Agile Architecture Method Explained - Chapter 7 - Reviewing Your Architecture
  242. Agile Architecture Method Explained - Chapter 8 - Communicating Your Architecture
  243. Agile Architecture Method Explained - Introduction
  244. Application Architecture Guide - Architecture and Design Solutions At a Glance
  245. Application Architecture Guide - Chapter 10 - Presentation Layer Guidelines
  246. Application Architecture Guide - Chapter 11 - Business Layer Guidelines
  247. Application Architecture Guide - Chapter 12 - Data Access Layer Guidelines
  248. Application Architecture Guide - Chapter 13 - Service Layer Guidelines
  249. Application Architecture Guide - Chapter 14 - Application Archetypes
  250. Application Architecture Guide - Chapter 15 - Web Applications
  251. Application Architecture Guide - Chapter 16 - Rich Internet Applications (RIA)
  252. Application Architecture Guide - Chapter 17 - Rich Client Applications
  253. Application Architecture Guide - Chapter 18 - Services
  254. Application Architecture Guide - Chapter 19 - Mobile Applications
  255. Application Architecture Guide - Chapter 1 - Fundamentals of Application Architecture
  256. Application Architecture Guide - Chapter 20 - Office Business Applications (OBA)
  257. Application Architecture Guide - Chapter 21 - SharePoint Line-Of-Business (LOB) Applications
  258. Application Architecture Guide - Chapter 2 - .NET Platform Overview
  259. Application Architecture Guide - Chapter 3 - Architecture and Design Guidelines
  260. Application Architecture Guide - Chapter 4 - Designing Your Architectures
  261. Application Architecture Guide - Chapter 5 - Deployment Patterns
  262. Application Architecture Guide - Chapter 6 - Architectural Styles
  263. Application Architecture Guide - Chapter 7 - Quality Attributes
  264. Application Architecture Guide - Chapter 8 - Communication Guidelines
  265. Application Architecture Guide - Chapter 9 - Layers and Tiers
  266. Application Architecture Guide - Cheat Sheet - Data Access Technology Matrix
  267. Application Architecture Guide - Cheat Sheet - Integration Technology Matrix
  268. Application Architecture Guide - Cheat Sheet - Presentation Technology Matrix
  269. Application Architecture Guide - Cheat Sheet - Workflow Technology Matrix
  270. Application Architecture Guide - Cheat Sheet - patterns
  271. Application Architecture Guide - Cheat Sheet - patterns & practices Pattern Catalog
  272. Application Architecture Guide - Fast Track
  273. Application Architecture Guide - Foreword by S. Somasegar
  274. Application Architecture Guide - Foreword by Scott Guthrie
  275. Application Architecture Guided - Introduction
  276. Architecture Frame
  277. Architecture and Design Checklist
  278. Assume all input is malicious.
  279. At a Glance: Security Inspections
  280. Attack Pattern Template
  281. Attack Template
  282. Audit and log access across application tiers.
  283. Auditing and Logging
  284. Auditing and Logging Vulnerabilities
  285. Authentication
  286. Authentication Vulnerabilities
  287. Authorization
  288. Authorization Vulnerabilities
  289. Avoid plain text passwords in configuration files
  290. Avoid storing secrets in the Local Security Authority (LSA).
  291. Avoid storing sensitive data in view state
  292. Back up and analyze log files regularly.
  293. Be able to disable accounts.
  294. Be careful with canonicalization issues.
  295. Buffer Overflow Attack Pattern
  296. Build Scenario Frame
  297. Business Layer Design Checklist
  298. Can impersonation be used with Forms authentication?
  299. Catch exceptions.
  300. Centralize your approach.
  301. Chapter 11 – Consolidating Various Types of Performance Acceptance Criteria
  302. Chapter 13 – Determining Individual User Data and Variances
  303. Chapter 14 – Test Execution
  304. Chapter 15 – Key Mathematic Principles for Performance Testers
  305. Chapter 16 – Performance Test Reporting Fundamentals
  306. Chapter 17 – Load-Testing Web Applications
  307. Chapter 18 – Stress-Testing Web Applications
  308. Chapter 1 – Fundamentals of Web Application Performance Testing
  309. Chapter 2 – Types of Performance Testing
  310. Chapter 3 – Risks Addressed Through Performance Testing
  311. Chapter 4 – Web Application Performance Testing Core Activities
  312. Chapter 5 – Coordinating Performance Testing with an Iteration-Based Process
  313. Chapter 6 – Managing an Agile Performance Test Cycle
  314. Chapter 7 – Managing the Performance Test Cycle in a Regulated (CMMI) Environment
  315. Chapter 8 – Evaluating Systems to Increase Performance-Testing Effectiveness
  316. Chapter 9 – Determining Performance Testing Objectives
  317. Cheat Sheet: .NET Framework 2.0 Security Inspection Questions
  318. Cheat Sheet: ASP.NET 2.0 Security Inspection Questions
  319. Cheat Sheet: Potentially Dangerous Unmanaged APIs
  320. Cheat Sheet: Security Engineering
  321. Cheat Sheet: Threat Modeling Terms
  322. Cheat Sheet: Threat Modeling Web Applications
  323. Cheat Sheet: Web Application Performance Frame
  324. Cheat Sheet: Web Application Security Frame
  325. Checklist Item Template
  326. Code Access Security (.NET 1.1) Security Checklist
  327. Code Example Template
  328. Communication Design Checklist
  329. Communications Security
  330. Communications Security Vulnerabilities
  331. Configuration Management
  332. Configuration Management Vulnerabilities
  333. Connect using a least privileged account
  334. Connection string management
  335. Consider authorization granularity
  336. Consider authorization granularity.
  337. Consider identity flow.
  338. Consider the identity that is used for resource access
  339. Constrain, Then Sanitize
  340. Constrain, reject, and sanitize your input.
  341. Constrain input
  342. Countermeasures
  343. Create application specific event source
  344. Cryptography
  345. Cryptography Vulnerabilities
  346. Data Layer Design Checklist
  347. Data privacy and integrity on the network
  348. Do I need to create a unique user account for each application pool?
  349. Do not cache sensitive data
  350. Do not develop your own cryptography.
  351. Do not leak information to the client.
  352. Do not mix session tokens and authentication tokens
  353. Do not pass sensitive data from page to page
  354. Do not pass sensitive data using the HTTP-GET protocol.
  355. Do not rely on client-side state management options
  356. Do not rely on client-side validation.
  357. Do not send passwords over the wire in plaintext.
  358. Do not store database connections, passwords, or keys in plaintext.
  359. Do not store passwords in user stores.
  360. Do not store secrets if you can avoid it.
  361. Do not store secrets in code.
  362. Do not store sensitive data in persistent cookies.
  363. Do not trust HTTP header information.
  364. Does the code centralize its approach?
  365. Does the code use protection="All"
  366. Does the code use the right algorithm with an adequate key size?
  367. Encode Output
  368. Encrypt sensitive cookie state.
  369. Encrypt sensitive data if you need to store it
  370. Encrypt the contents of the authentication cookies.
  371. Encrypt the data or secure the communication channel.
  372. Engineering Practices Frame
  373. Engineering Practices Overview
  374. Engineering Practices Project
  375. Ensure database connections are always closed
  376. Enterprise Services (.NET 1.1) Performance Checklist
  377. Enterprise Services (.NET 1.1) Performance Guidelines - Design Considerations
  378. Enterprise Services (.NET 1.1) Performance Guidelines - Loosely Coupled Events
  379. Enterprise Services (.NET 1.1) Performance Guidelines - Object Pooling
  380. Enterprise Services (.NET 1.1) Performance Guidelines - Queued Components
  381. Enterprise Services (.NET 1.1) Performance Guidelines - Resource Management
  382. Enterprise Services (.NET 1.1) Performance Guidelines - Security
  383. Enterprise Services (.NET 1.1) Performance Guidelines - State Management
  384. Enterprise Services (.NET 1.1) Performance Guidelines - Threading
  385. Enterprise Services (.NET 1.1) Performance Guidelines - Transactions
  386. Enterprise Services (.NET 1.1) Security Checklist
  387. Exception Gatekeeper
  388. Exception Management
  389. Exception Management Vulnerabilities
  390. Explained: ASP.NET Formula for Reducing Contention
  391. Explained: Asynchronous Calls Explained
  392. Explained: Collections Explained
  393. Explained: DataSet vs. DataReader
  394. Explained: Forms Authentication in ASP.NET 2.0
  395. Explained: Locking and Synchronization Explained
  396. Explained: Remoting Architecture
  397. Explained: Remoting Leases
  398. Explained: SQL Server Scale Up vs. Scale Out
  399. Explained: Server GC vs. Workstation GC
  400. Explained: Web Services, Enterprise Services and Remoting
  401. Explained: Web Services (ASMX 1.1) Architecture
  402. Explained: Windows Authentication in ASP.NET 2.0
  403. FAQs
  404. Fail securely
  405. Feedback
  406. Firewall restrictions
  407. Foreword By Alberto Savoia
  408. Foreword By Rico Mariani
  409. Format String Attack
  410. Glossary
  411. Guidance Overview
  412. Guideline Item Template
  413. HTTP Replay Attack
  414. How To: Create a Performance Model for a Web Application
  415. How To: Delay Sign an Assembly in .NET 2.0
  416. How To: Perform a Security Code Review Review for Managed Code (Baseline Technique)
  417. How To: Perform a Security Deployment Review for ASP.NET 2.0
  418. How To: Use SecureString in .NET 2.0
  419. How To Delay Sign an Assembly in .NET 2.0
  420. How To Handle Special Characters With Dynamic SQL
  421. How To Identify Buffer Overflow Vulnerabilities
  422. How To Identify Buffer Underwrite Vulnerabilities
  423. How To Identify Cross Site Scripting Vulnerabilities
  424. How To Identify Heap Overflow Vulnerabilities
  425. How To Identify Improper String Length Checking Vulnerabilities
  426. How To Identify Integer Overflow Vulnerabilities
  427. How To Identify Miscalculated Null Termination Vulnerabilities
  428. How To Identify SQL Injection Vulnerabilities
  429. How To Improve Serialization Performance
  430. How To Optimize SQL Indexes
  431. How To Page Records in .NET Applications
  432. How To Perform a Security Deployment Inspection for ASP.NET 2.0
  433. How To Protect from Buffer Underwrites
  434. How To Protect from Heap Overflows
  435. How To Protect from Improper String Length Checking
  436. How To Protect from Injection Attacks in ASP.NET 2.0
  437. How To Protect from Integer Overflow
  438. How To Protect from Miscalculated Null Termination
  439. How To Protect from Stack Overflows
  440. How To Protect from Unchecked Array Indexing
  441. How To Recognize Buffer Overflow Vulnerabilities
  442. How To Recognize Buffer Underwrite Vulnerabilities
  443. How To Recognize Cross Site Scripting Vulnerabilities
  444. How To Recognize Improper String Length Checking Vulnerabilities
  445. How To Recognize Integer Overflow Vulnerabilities
  446. How To Recognize Miscalculated Null Termination Vulnerabilities
  447. How To Recognize SQL Injection Vulnerabilities
  448. How To Recognize Stack Overflow Vulnerabilities
  449. How To Submit and Poll for Long-Running Tasks
  450. How To Template
  451. How To Test For Buffer Overflow Vulnerabilities
  452. How To Time Managed Code Using QueryPerformanceCounter and QueryPerformanceFrequency
  453. How To Use EIF
  454. How To Use SQL Profiler
  455. How To Use SecureString in .NET 2.0
  456. How can I retain impersonation in the new thread created from ASP.NET application?
  457. How do I Sign .Net assemblies with Authenticode signature?
  458. How do I cache roles in ASP.NET 2.0?
  459. How do I configure account lockout using membership feature in ASP.Net 2.0?
  460. How do I create a custom trust level for ASP.NET?
  461. How do I create a service account for running my ASP.NET applications?
  462. How do I decide my Authentication strategy in ASP.NET?
  463. How do I delay sign an ASP.NET application assembly?
  464. How do I enable Forms Authentication to work with multiple Active Directory domains?
  465. How do I enable my ASP.NET application to write to new event source?
  466. How do I encrypt sensitive data in machine.config or web.config file?
  467. How do I enforce strong passwords using membership feature in ASP.NET 2.0
  468. How do I flow the original user identity to different layers?
  469. How do I handle exceptions securely?
  470. How do I impersonate a specific (fixed) identity?
  471. How do I impersonate the original caller?
  472. How do I implement single sign on using forms authentication?
  473. How do I instrument my application for security?
  474. How do I lock authorization settings?
  475. How do I lock configuration settings?
  476. How do I pre-compile my ASP.NET application?
  477. How do I prevent detailed errors from returning to the client?
  478. How do I protect Forms Authentication?
  479. How do I protect audit and log files?
  480. How do I protect authorization cookie when using role caching in ASP.NET 2.0?
  481. How do I protect my web application's ViewState?
  482. How do I protect passwords?
  483. How do I protect passwords in user store?
  484. How do I protect sensitive data in configuration files?
  485. How do I protect sensitive data in memory?
  486. How do I protect sensitive data in the database?
  487. How do I protect the database connection strings in web.config file?
  488. How do I run an ASP.NET application with a particular identity?
  489. How do I secure Session State information?
  490. How do I set up a SQL Server or SQL Express database for Membership, Profiles and Role Management?
  491. How do I setup a global exception handler for my application?
  492. How do I strong-name an ASP.NET application assembly?
  493. How do I strong name an ASP.NET application?
  494. How do I temporarily impersonate the original caller?
  495. How do I use File Authorization in ASP.NET 2.0?
  496. How do I use Forms Authentication with Active Directory?
  497. How do I use Forms Authentication with SQL Server database?
  498. How do I use RoleManager in my application?
  499. How do I use Role Authorization in ASP.NET 2.0?
  500. How do I use SQL authentication for connecting to SQL server?

View (previous 500) (next 500) (20 | 50 | 100 | 250 | 500).

Views
Personal tools