Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Code Quality
Table 1-1: Minimum List of Visual C++ Compiler and /analyze Warnings You Should Review
Chapter 2: User Account Control, Tokens, and Integrity Levels
Table 2-1: requestedExecutionLevel Manifest Options
Table 2-2: “UAC-Friendly” Storage Locations for User Data
Table 2-3: Integrity SIDs
Chapter 3: Buffer Overrun Defenses
Table 3-1: Effect of Stack Randomization on Application Addresses
Chapter 6: Internet Explorer 7 Defenses
Table 6-1: Various ActiveX Scenarios in Internet Explorer
Table 6-2: Internet Explorer 7.0 Protected Mode Helper Functions
Chapter 7: Cryptographic Enhancements
Table 7-1: Cryptographic Algorithms in Windows Vista CNG
Table 7-2: Elliptic Curve Cryptographic Algorithms in Windows Vista CNG
Table 7-3: New SSL/TLS Cipher Suites in Windows Vista
Chapter 9: Miscellaneous Defenses and Security-Related Technologies
Table 9-1: The TPM Input Buffer Format
Table 9-2: The TPM Output Buffer Format
Previous page
Table of content
Next page
Writing Secure Code for Windows Vista (Best Practices (Microsoft))
ISBN: 0735623937
EAN: 2147483647
Year: 2004
Pages: 122
Authors:
Michael Howard
,
David LeBlanc
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Selecting the Top n Rows in a DataTable
Transferring Login Credentials Securely
Retrieving a Single Value from a Query
Creating a Table in the Database from a DataTable Schema
A.1. General Considerations
Absolute Beginner[ap]s Guide to Project Management
One Title, Many Roles
What Causes Unplanned Scope Changes?
Where Is Leadership Needed on a Project?
Seven Tips for Sellers
Project End Checklist13 Important Steps
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 31. Plot Dymaxion Maps in Perl
Hack 36. Shorten Online Map URLs
Conclusion
Hacks 87-92
Hack 90. Crawl the Geospatial Web with RedSpider
An Introduction to Design Patterns in C++ with Qt 4
Member Access Specifiers
QApplication and the Event Loop
Values and Objects
Dialogs
QVariant Class: Accessing Properties
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
System Monitoring
Configuring Accounting
Deployment Scenarios
Advanced Features
Site-to-Site VPN Setup Using PKI
Python Standard Library (Nutshell Handbooks) with
The atexit Module
The Queue Module
The ihooks Module
The cmd Module
The timing Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies