Writing Secure Code for Windows Vista (Best Practices (Microsoft))
Chapter 1: Code Quality
- Table 1-1: Minimum List of Visual C++ Compiler and /analyze Warnings You Should Review
Chapter 2: User Account Control, Tokens, and Integrity Levels
- Table 2-1: requestedExecutionLevel Manifest Options
- Table 2-2: “UAC-Friendly” Storage Locations for User Data
- Table 2-3: Integrity SIDs
Chapter 3: Buffer Overrun Defenses
- Table 3-1: Effect of Stack Randomization on Application Addresses
Chapter 6: Internet Explorer 7 Defenses
- Table 6-1: Various ActiveX Scenarios in Internet Explorer
- Table 6-2: Internet Explorer 7.0 Protected Mode Helper Functions
Chapter 7: Cryptographic Enhancements
- Table 7-1: Cryptographic Algorithms in Windows Vista CNG
- Table 7-2: Elliptic Curve Cryptographic Algorithms in Windows Vista CNG
- Table 7-3: New SSL/TLS Cipher Suites in Windows Vista
Chapter 9: Miscellaneous Defenses and Security-Related Technologies
- Table 9-1: The TPM Input Buffer Format
- Table 9-2: The TPM Output Buffer Format