Microsoft Windows Internals (4th Edition): Microsoft Windows Server 2003, Windows XP, and Windows 2000

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

abstract classes, WMI CIM

accept function

accept TDI IRP AcceptEx function Access

access checks [See also access control]     access tokens     impersonation

     object manager

     restricted tokens

     security identifiers

access control [See also security]

     access checks     C2 security rating     security descriptors     Windows and Access token executive object typeaccess tokens     access checks

     EPROCESS block     jobwide

     LSASS     processes 2nd 3rd     restricted

     user logon

     viewing, with kernel debugger

access-control entries (ACEs)

     relative ordering of     security descriptors

access-control lists (ACLs)     assignment

     file objects     section objects

     security descriptors

access-denied errors 2nd AccessCheck function AccessCheckByType function

account rights [See also privileges]

    accounts [See administrator accounts; service accounts; user accounts]

     Accvio.exe tool

Active Directory

     authentication

     DNS

     domain accounts

     IPSec Group Policies

     network service and APIs

     RPC

     security 2nd

Active Directory Service Interfaces (ADSI)

Active Directory Users and Groups MMC snap-in

active logon sessions active pages 2nd active processes

active processor mask ActiveX controls, WMI add-device routines, device driver 2nd

address objects, TDI

address open TDI IRP

address space [See virtual address space]

address translation

     byte index     IA 2nd     large pages     memory manager task     page directories     page tables and page table entries 2nd     Physical Address Extension (PAE)

     process     translation look-aside buffer

     x 2nd 3rd 4th Address Windowing Extensions (AWE) 2nd addresses [See also virtual address space]

     viewing start, for threads

     well-known

AddUsersToEncryptedFile function

     Administrative Toolsadministrator accounts

     Recovery Console     RIDs

     security ratings Advanced Configuration and Power Interface (ACPI) specification

Advanced Encryption Standard (AES)

Advanced Power Management (APM) standard     Advanced Programmable Interrupt Controllers (APICs) 2nd Advanced RISC Computing (ARC) naming convention 2nd

Advanced Settings dialog box 2nd

Advanced Technology Attachment (ATA) systems

Advapi32.dll 2nd 3rd

AES (Advanced Encryption Standard)

affinity, processor [See processor affinity]

     affinity manager

Aha154x.sys

alertable wait states

algorithms

     demand-paging 2nd

     EFS encryption

     multiprocessor thread scheduling

     security descriptors and access

AllocateUserPhysicalPages function allocation granularity 2nd Alpha AXP systems

alternate accounts, service alternate hives AMD processors 2nd

analysis pass, NTFS recovery

Ancillary Function Driver (AFD)

anonymous access, local service accounts and

ANSI character strings

anti-replay, IPSec APC objects 2nd [See also asynchronous procedure calls (APCs)] APC_LEVEL IRQLs 2nd 3rd 4th APCs (asynchronous procedure calls) 2nd 3rd 4th APICs (Advanced Programmable Interrupt Controllers) 2ndAPIs (application programming interfaces)     Active Directory APIs

     AuthZ API     CryptoAPI 2nd

     Data Protection API     networking APIs     Performance Data Helper API

    Windows API [See Windows API]

APM (Advanced Power Management) standard

AppleTalk protocol

Application Compatibility Toolkit 2ndapplication desktops [See desktops]

application layer, OSI modelapplication programming interfaces [See APIs (application programming interfaces)]

applications 2nd [See also programs] [See also executable images]     boot-verification

    client [See clients]

     Event Tracing for Windows     locking memory     management

     Microsoft iSCSI Software Initiator management

     processes 2nd

     registry settings 2nd

     Regmon tool troubleshooting techniques

     restoring, using System Restore

     running, as services

     security functions

    server [See servers]

     service

    setup [See setup programs]

     side-by-side assemblies

     startup and logical prefetcher 2nd [See also prefetching]

    tools [See tools]

     viewing registry polling activity Applied Microsoft .NET Framework Programming ARC (Advanced RISC Computing) naming convention 2nd

architecture, Windows [See system architecture, Windows]     ASCII characters ASMP (asymmetric multiprocessing)

     assemblies, side-by-side

assembly programming language 2nd

ASSERT macro

assignment, ACL

assignment, volume drive-letter [See volume namespace] associate address TDI IRP association classes, WMI associative memory, TLB asymmetric multiprocessing (ASMP)     asynchronous I/O [See also I/O system] asynchronous procedure calls (APCs) 2nd 3rd 4th

asynchronous read-ahead with history asynchronous socket operations, Winsock

Asynchronous Transfer Mode (ATM) ATA (Advanced Technology Attachment) systems Atapi.sys

atomic transactions

attributes

     executive object header

     file object     NTFS 2nd 3rd 4th

     object     section object 2nd

     type object audio calls

Audit Log

auditing, security 2nd 3rd 4th 5th authentication [See also security]     Active Directory APIs

     IPSec

     packages 2nd 3rd

     password

     RPC

    server certificates [See server certificates]

AuthZ API

auto-start device driver loading

2nd [See services]

Autochk.exe tool

Automated System Recovery (ASR)

automatic startup, programs and

     Autoruns tool

 < Day Day Up >   

Категории