List of Tables


Chapter 1: Code Quality

Table 1-1: Minimum List of Visual C++ Compiler and /analyze Warnings You Should Review

Chapter 2: User Account Control, Tokens, and Integrity Levels

Table 2-1: requestedExecutionLevel Manifest Options
Table 2-2: “UAC-Friendly” Storage Locations for User Data
Table 2-3: Integrity SIDs

Chapter 3: Buffer Overrun Defenses

Table 3-1: Effect of Stack Randomization on Application Addresses

Chapter 6: Internet Explorer 7 Defenses

Table 6-1: Various ActiveX Scenarios in Internet Explorer
Table 6-2: Internet Explorer 7.0 Protected Mode Helper Functions

Chapter 7: Cryptographic Enhancements

Table 7-1: Cryptographic Algorithms in Windows Vista CNG
Table 7-2: Elliptic Curve Cryptographic Algorithms in Windows Vista CNG
Table 7-3: New SSL/TLS Cipher Suites in Windows Vista

Chapter 9: Miscellaneous Defenses and Security-Related Technologies

Table 9-1: The TPM Input Buffer Format
Table 9-2: The TPM Output Buffer Format



Writing Secure Code for Windows Vista
Writing Secure Code for Windows Vista (Best Practices (Microsoft))
ISBN: 0735623937
EAN: 2147483647
Year: 2004
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net