Writing Secure Code for Windows Vista (Best Practices (Microsoft))

Chapter 2: User Account Control, Tokens, and Integrity Levels

What Are Deny SIDs?
The Mysterious Case of the Disappearing Elevation Prompt
User Interface Privilege Isolation

Chapter 3: Buffer Overrun Defenses

Bypassing NX

Chapter 4: Networking Defenses

Setting the Group and Interface Properties
BOOL, bool, and VARIANT_BOOL

Chapter 5: Creating Secure and Resilient

Local and Global Namespaces

Chapter 6: Internet Explorer 7 Defenses

Why Doesn’t Microsoft Just Get Rid of ActiveX Controls?

Chapter 9: Miscellaneous Defenses and Security-Related Technologies

What Is a Trusted Platform Module?

Категории