Appendix B: References


64-bit Anti-Virus Software, http://www.msinfluentials.com/blogs/jesper/archive/2007/02/17/64-bit-anti-virus-for-vista.aspx.

Biba, K. J. Integrity considerations for secure computer systems, Technical Report MTR-3153. (1975). Bedford, MA: Mitre Corporation.

Blaster worm information, http://www.en.wikipedia.org/wiki/Blaster_worm.

Bollefer, T., Chander, G., Johansson, J., Kass, M., & Olson, E. Building and Configuring More Secure Web Sites. (December, 2002). Retrieved February 20, 2007, from Microsoft Developer Network, http://www.msdn2.microsoft.com/enus/library/aa302370.aspx.

Bowditch, N. The American Practical Navigator. (1802). Paradise Cay Publications.

Bradley, S. (2006). Retrieved January 14, 2007, from ThreatCode: http://www.threatcode.com.

Brett Hill's IIS http://www.Answers.com, http://www.iisanswers.com.

Brown, K. (2006). Retrieved January 14, 2007, from Hall of Shame, http://www.pluralsite.com/wiki/default.aspx/Keith/HallOfShame.html.

The Cable Guy. AuthIP In Windows Vista. (August 1, 2006). Retrieved February 19, 2007, from Microsoft TechNet, http://www.microsoft.com/technet/community/columns/cableguy/cg0806.mspx.

Desktop Isolation Security Bulletin, http://www.microsoft.com/technet/security/bulletin/MS00-020.msp.

Flaming, R. UAC in MSI Notes. (September 20, 2006). Retrieved January 14, 2007, from Microsoft Developer Network, http://www.blogs.msdn.com/rflaming/archive/2006/09/20/763945.aspx.

Fry, J. D. D: Notebook. (2005) Retrieved January 14, 2007, from Wall Street Journal Online, http://www.online.wsj.com/public/article/SB111684809888140520-uxjBS77gsFQvsi4ikXZzNxZjpd8_20060523.html?mod=blogs.

Howard, M. Weblog. (2007). Retrieved January 14, 2007, from Microsoft Developer Network, http://www.blogs.msdn.com/michael_howard.

Johansson, J. M. Frequently Asked Questions About Passwords. (October 12, 2005). Retrieved January 25, 2007, from Microsoft TechNet, http://www.microsoft.com/technet/community/columns/secmgmt/sm1005.mspx.

Johansson, J. M. Help Wanted-Need "People People". (2006). TechNet Magazine, http://www.microsoft.com/technet/technetmag/issues/2006/07/SecurityWatch/default.aspx

Johansson, J. M. More options on protecting against recent IE vulnerabilities on a domain. (September 22, 2006). Retrieved February 14, 2007, from Jesper's Blog, http://www.msinfluentials.com/blogs/jesper/archive/2006/09/22/More-options-on-protecting-against-the-VML-vulnerability-on-a-domain.aspx.

Johansson, J. M. The Most Misunderstood Security Setting of All Time. (August, 2006). TechNet Magazine.

Johansson, J. M. Please Don't Disable Security Features, At Least While We Are Testing Them. (June 22, 2006). Retrieved January 14, 2007, from Microsoft TechNet, http://www.blogs.technet.com/jesper_johansson/archive/2006/06/22/438316.aspx.

Johansson, J. M. Protect Your Windows Network. (2005). New York: Addison-Wesley.

Mar-Elia, Darren, et. al, Microsoft Windows Group Policy Guide (Pro-One-Offs), Microsoft Press, 2005.

Margosis, A. Weblog. (2007). Retrieved January 14, 2007, from Microsoft Developer Network, http://www.blogs.msdn.com/aaron_margosis/default.aspx.

Maybeck, H. F. Z-Time. (2006). Retrieved January 14, 2007, http://www.maybeck.com/ztime/.

Microsoft Corporation. Active Directory Schema Extensions for Windows Vista Wireless and Wired Group Policy Enhancements. (May 31, 2006) Retrieved January 20, 2007, from Microsoft TechNet, http://www.microsoft.com/technet/network/wifi/vista_ad_ext.mspx.

Microsoft Corporation. ADMX Schema. (2007). Retrieved January 18, 2007, from Microsoft Developer Network, http://www.msdn2.microsoft.com/en-gb/library/aa373476.aspx.

Microsoft Corporation. Certain Programs Do Not Work Correctly If You Log On Using A Limited User Account. (2006). Retrieved January 14, 2007, from Microsoft TechNet, http://www.support.microsoft.com/default.aspx?scid=kb;enus;307091.

Microsoft Corporation. Configuring Active Directory to Back up Windows Bit-Locker Drive Encryption and Trusted Platform Module Recovery Information. (January 9, 2007). Retrieved January 20, 2007, from Microsoft Download Center, http://www.microsoft.com/downloads/details.aspx?FamilyID=.

Microsoft Corporation. The COM Elevation Moniker. (January 2007). Retrieved January 18, 2007, from Microsoft Developer Network, http://www.msdn2.microsoft.com/en-us/library/ms679687.aspx.

Microsoft Corporation. Deploying Group Policy Using Windows Vista. (2007). Retrieved January 18, 2007, from Microsoft TechNet, http://www.go.microsoft.com/fwlink/?LinkId=77080.

Microsoft Corporation. Domain Isolation with Microsoft Windows explained. (2007). Retrieved February 19, 2007, from Microsoft TechNet, http://www.technet2.microsoft.com/WindowsVista/en/library/1033.mspx.

Microsoft Corporation. Policy Series: Group Policy Security Templates and IPSEC. (2004). Retrieved February 19, 2007, from Microsoft TechNet, http://www.microsoft.com/technet/community/chats/trans/windowsnet/wnet_112904b.mspx.

Microsoft Corporation. Group Policy Settings Reference for Windows Vista. (November 20, 2006). Retrieved January 15, 2007, from http://www.Microsoft.com, http://www.go.microsoft.com/fwlink/?LinkId=54020.

Microsoft Corporation. Security Configuration Guidance Support. (February 6, 2007) Retrieved February 14, 2007, from Microsoft Knowledge Base, http://www.support.microsoft.com/kb/885409/en-us.

Microsoft Corporation. Security Descriptor Definition Language. (2007) Retrieved February 14, 2007, from Microsoft Developer Network, http://www.msdn2.microsoft.com/en-us/library/aa379567.aspx.

Microsoft Corporation. Services in Windows Vista. (2006). http://www.go.microsoft.com/fwlink/?LinkId=71280.

Microsoft Corporation. ShellExecuteEx Function. (2007). Retrieved January 18, 2007, from Microsoft Developer Network, http://www.msdn.microsoft.com/library/en-us/shellcc/platform/shell/reference/functions/shellexecuteex.asp.

Microsoft Corporation. Step-By-Step Guide to Controlling Device Installation and Usage with Group Policy. (2007). Retrieved January 18, 2007, from Microsoft TechNet, http://www.go.microsoft.com/fwlink/?LinkId=75123.

Microsoft Corporation. Step-by-Step Guide to Managing Multiple Local Group Policy Objects. (2007) Retrieved January 16, 2007, from Microsoft TechNet, http://www.go.microsoft.com/fwlink/?LinkId=73434.

Microsoft Corporation. System-Supplied Device Setup Classes. (2007). Retrieved January 18, 2007, from Microsoft Developer Network, http://www.msdn2.microsoft.com/en-us/library/ms791130.aspx.

Microsoft Corporation. Troubleshooting Group Policy Using Event Logs. (2007) Retrieved January 20, 2007, from Microsoft TechNet, http://www.go.microsoft.com/fwlink/?LinkId=74139.

Microsoft Corporation. When you use Windows Server 2003 or Windows XP to modify a Windows Vista registry hive, Windows Vista registry key flags are removed. (January 10, 2007) Retrieved January 20, 2007, from Microsoft TechNet, http://www.support.microsoft.com/?kbid=926044.

Microsoft Corporation. Windows Server 2003 Group Policy. (2006). Retrieved January 15, 2007, from Microsoft TechNet, http://www.go.microsoft.com/fwlink/?linkid=15088.

Microsoft Corporation. Windows Server 2003 Security Guide. (May 18, 2006). Retrieved March 16, 2007, from Microsoft Download Center, http://www.microsoft.com/downloads/details.aspx?familyid=.

Microsoft Corporation. Windows Vista Security Guide. (November 20, 2006) Retrieved January 15, 2007, from Microsoft TechNet, http://www.go.microsoft.com/fwlink/?LinkId=74028.

Microsoft Corporation. (2006). Retrieved January 14, 2007, from Microsoft Platform Software Development Kit, http://www.go.microsoft.com/fwlink?LinkID=55774.

Microsoft Desktop Optimization Pack, http://www.microsoft.com/windowsvista/getready/optimizeddesktop.mspx.

Microsoft's IIS Internet Information Services site, http://www.iis.net.

Microsoft SoftGrid, http://www.softricity.com/index.asp.

Moskowitz, J. Group Policy, Profiles, and IntelliMirror for WindowsVista, Windows2003, WindowsXP, and Windows2000, 4th Edition. (2007). Sybex.

Ponemon Institute. Ponemon Institute. (2007). Retrieved January 22, 2007, http://www.ponemon.org.

Russinovich, M. E. & Solomon, David A., Microsoft Windows Internals 4th Ed., (2004). Microsoft Press.

Server and Domain Isolation Tech Center, http://www.microsoft.com/sdisolation.

Shatter Attack, http://www.microsoft.com/technet/security/bulletin/MS02-071.msp.

SoftGrid Demo, http://www.blogs.technet.com/kevinsul_blog/archive/2006/09/06/454467.aspx.

SQL Slammer worm information, http://www.en.wikipedia.org/wiki/SQL_slammer_worm.

Threat Code, http://www.threatcode.com.

User Account Control Overview, http://www.microsoft.com/technet/technetmag/issues/2006/11/UAC/default.aspx.

Windows Resource Protection, http://www.msdn.microsoft.com/library/enus/dnlong/html/AppComp.asp?frame=true#appcomp_topic6.

Windows Vista Restart Manager, http://www.msdn.microsoft.com/library/en-us/rstmgr/rstmgr/portal.asp.

Writing Services for Compatibility with Windows Vista, http://www.microsoft.com/whdc/system/vista/services.mspx.



Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net