Đang chuẩn bị liên kết để tải về tài liệu:
Module 8: Making Applications Secure
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Tham khảo tài liệu 'module 8: making applications secure', công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | msdn training Module 8 Making Applications Secure Contents Overview Overview of Windows 2000 Security Declarative Security Lab 8.1 Implementing Declarative Security Programmatic Security Lab 8.2 Implementing Programmatic Security Setting the Identity of a Server Application Lab 8.3 Assigning a COM Application Identity Best Practices Review Microsoft Information in this document is subject to change without notice. The names of companies products people characters and or data mentioned herein are fictitious and are in no way intended to represent any real individual company product or event unless otherwise noted. Complying with all applicable copyright laws is the responsibility of the user. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical for any purpose without the express written permission of Microsoft Corporation. If however your only means of access is electronic permission to print one copy is hereby granted. Microsoft may have patents patent applications trademarks copyrights or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft the furnishing of this document does not give you any license to these patents trademarks copyrights or other intellectual property. 2000 Microsoft Corporation. All rights reserved. Microsoft BackOffice MS-DOS Windows Windows NT Active Directory PowerPoint and Visual Basic are either registered trademarks or trademarks of Microsoft Corporation in the U.S.A. and or other countries. The names of companies products people characters and or data mentioned herein are fictitious and are in no way intended to represent any real individual company product or event unless otherwise noted. Other product and company names mentioned herein may be the trademarks of their respective owners. Module 8 Making Applications Secure i Instructor Notes Presentation This module provides .