| Table of Contents |
| Writing Secure Code for Windows Vista |
| Foreword |
| Introduction |
| Chapter 1 | - | Code Quality |
| Chapter 2 | - | User Account Control, Tokens, and Integrity Levels |
| Chapter 3 | - | Buffer Overrun Defenses |
| Chapter 4 | - | Networking Defenses |
| Chapter 5 | - | Creating Secure and Resilient |
| Chapter 6 | - | Internet Explorer 7 Defenses |
| Chapter 7 | - | Cryptographic Enhancements |
| Chapter 8 | - | Authentication and Authorization |
| Chapter 9 | - | Miscellaneous Defenses and Security-Related Technologies |
| Index |
| List of Figures |
| List of Tables |
| List of Sidebars |