References

64-bit Anti-Virus Software, http://msinfluentials.com/blogs/jesper/ archive/2007/02/17/64-bit-anti-virus-for-vista.aspx.

K. J. Biba Integrity considerations for secure computer systems, Technical Report MTR-3153. (1975). Bedford, MA: Mitre Corporation.

Blaster worm information, http://en.wikipedia.org/wiki/Blaster_worm.

T. Bollefer, G. Chander, J. Johansson, M. Kass, & E. Olson Building and Configuring More Secure Web Sites. (December, 2002). Retrieved February 20, 2007, from Microsoft Developer Network, http://msdn2.microsoft.com/en-us/library/aa302370.aspx.

N. Bowditch The American Practical Navigator. (1802). Paradise Cay Publications.

S. Bradley (2006). Retrieved January 14, 2007, from ThreatCode: www.threatcode.com.

Brett Hill's IIS Answers.com, www.iisanswers.com.

K. Brown (2006). Retrieved January 14, 2007, from Hall of Shame, www.pluralsite.com/wiki/default.aspx/Keith/HallOfShame.html.

The Cable Guy. AuthIP In Windows Vista. (August 1, 2006). Retrieved Fnebruary 19, 2007, from Microsoft TechNet, www.microsoft.com/technet/community/columns/cableguy/cg0806.mspx.

Desktop Isolation Security Bulletin, www.microsoft.com/technet/security/ bulletin/MS00-020.msp.

R. Flaming UAC in MSI Notes.(September 20, 2006). Retrieved January 14, 2007, from Microsoft Developer Network, http://blogs.msdn.com/rflaming/archive/2006/09/20/763945.aspx.

J. D. Fry D: Notebook.(2005) Retrieved January 14, 2007, from Wall Street Journal Online, http://online.wsj.com/public/article/SB111684809888140520-uxjBS77gsFQvsi4ikXZzNxZjpd8_20060523.html?mod=blogs.

M. Howard Weblog. (2007). Retrieved January 14, 2007, from Microsoft Developer Network, http://blogs.msdn.com/michael_howard.

J. M. Johansson Frequently Asked Questions About Passwords.(October 12, 2005). Retrieved January 25, 2007, from Microsoft TechNet, www.microsoft.com/technet/community/columns/secmgmt/sm1005.mspx.

J. Johansson M. Help Wanted - Need "People People". (2006). TechNet Magazine, www.microsoft.com/technet/technetmag/issues/2006/07/SecurityWatch/ default.aspx

J. M. Johansson More options on protecting against recent IE vulnerabilities on a domain. (September 22, 2006). Retrieved February 14, 2007, from Jesper's Blog, http://msinfluentials.com/blogs/jesper/archive/2006/09/22/More-options-on-protecting-against-the-VML-vulnerability-on-a-domain.aspx.

J. M. Johansson The Most Misunderstood Security Setting of All Time. (August, 2006). TechNet Magazine.

J. M. Johansson Please Don't Disable Security Features, At Least While We Are Testing Them. (June 22, 2006). Retrieved January 14, 2007, from Microsoft TechNet, http://blogs.technet.com/jesper_johansson/archive/2006/06/22/438316 .aspx.

J. M. Johansson Protect Your Windows Network. (2005). New York: Addison-Wesley.

Darren Mar-Elia, et. al, Microsoft Windows Group Policy Guide (Pro-One-Offs), Microsoft Press, 2005.

A. Margosis Weblog. (2007). Retrieved January 14, 2007, from Microsoft Developer Network, http://blogs.msdn.com/aaron_margosis/default.aspx.

H. F. Maybeck Z-Time. (2006). Retrieved January 14, 2007, www .maybeck.com/ztime/.

Microsoft Corporation. Active Directory Schema Extensions for Windows Vista Wireless and Wired Group Policy Enhancements. (May 31, 2006) Retrieved January 20, 2007, from Microsoft TechNet, www.microsoft.com/technet/network/wifi/ vista_ad_ext.mspx.

Microsoft Corporation. ADMX Schema. (2007). Retrieved January 18, 2007, from Microsoft Developer Network, http://msdn2.microsoft.com/en-gb/ library/aa373476.aspx.

Microsoft Corporation. Certain Programs Do Not Work Correctly If You Log On Using A Limited User Account. (2006). Retrieved January 14, 2007, from Microsoft TechNet, http://support.microsoft.com/default.aspx?scid=kb;enus;307091.

Microsoft Corporation. Configuring Active Directory to Back up Windows Bit-Locker Drive Encryption and Trusted Platform Module Recovery Information. (January 9, 2007). Retrieved January 20, 2007, from Microsoft Download Center, www.microsoft.com/downloads/details.aspx?FamilyID=3a207915-dfc3-4579-90cd-86ac666f61d4.

Microsoft Corporation. The COM Elevation Moniker. (January 2007). Retrieved January 18, 2007, from Microsoft Developer Network, http:// msdn2.microsoft.com/en-us/library/ms679687.aspx.

Microsoft Corporation. Deploying Group Policy Using Windows Vista. (2007). Retrieved January 18, 2007, from Microsoft TechNet, http://go.microsoft .com/fwlink/?LinkId=77080.

Microsoft Corporation. Domain Isolation with Microsoft Windows explained. (2007). Retrieved February 19, 2007, from Microsoft TechNet, http://tech-net2.microsoft.com/WindowsVista/en/library/69cf3159-77ea-4a56-9808-a3f35d2ccc3f1033.mspx.

Microsoft Corporation. Group Policy Series: Group Policy Security Templates and IPSEC. (2004). Retrieved February 19, 2007, from Microsoft TechNet, www.microsoft.com/technet/community/chats/trans/windowsnet/wnet_11 2904b.mspx.

Microsoft Corporation. Group Policy Settings Reference for Windows Vista. (November 20, 2006). Retrieved January 15, 2007, from Microsoft.com, http://go.microsoft.com/fwlink/?LinkId=54020.

Microsoft Corporation. Security Configuration Guidance Support.(February 6, 2007) Retrieved February 14, 2007, from Microsoft Knowledge Base, http://support.microsoft.com/kb/885409/en-us.

Microsoft Corporation. Security Descriptor Definition Language. (2007) Retrieved February 14, 2007, from Microsoft Developer Network, http://msdn2.microsoft.com/en-us/library/aa379567.aspx.

Microsoft Corporation. Services in Windows Vista. (2006). http://go.microsoft.com/fwlink/?LinkId=71280.

Microsoft Corporation. ShellExecuteEx Function. (2007). Retrieved January 18, 2007, from Microsoft Developer Network, http://msdn.microsoft.com/ library/en-us/shellcc/platform/shell/reference/functions/ shellexecuteex.asp.

Microsoft Corporation. Step-By-Step Guide to Controlling Device Installation and Usage with Group Policy. (2007). Retrieved January 18, 2007, from Microsoft TechNet, http://go.microsoft.com/fwlink/?LinkId=75123.

Microsoft Corporation. Step-by-Step Guide to Managing Multiple Local Group Policy Objects. (2007) Retrieved January 16, 2007, from Microsoft TechNet, http://go.microsoft.com/fwlink/?LinkId=73434.

Microsoft Corporation. System-Supplied Device Setup Classes. (2007). Retrieved January 18, 2007, from Microsoft Developer Network, http://msdn2.microsoft .com/en-us/library/ms791130.aspx.

Microsoft Corporation. Troubleshooting Group Policy Using Event Logs. (2007) Retrieved January 20, 2007, from Microsoft TechNet, http://go.microsoft .com/fwlink/?LinkId=74139.

Microsoft Corporation. When you use Windows Server 2003 or Windows XP to modify a Windows Vista registry hive, Windows Vista registry key flags are removed. (January 10, 2007) Retrieved January 20, 2007, from Microsoft TechNet, http://support.microsoft.com/?kbid=926044.

Microsoft Corporation. Windows Server 2003 Group Policy. (2006). Retrieved January 15, 2007, from Microsoft TechNet, http://go.microsoft.com/fwlink/ ?linkid=15088.

Microsoft Corporation. Windows Server 2003 Security Guide. (May 18, 2006). Retrieved March 16, 2007, from Microsoft Download Center, www.microsoft .com/downloads/details.aspx?familyid=8A2643C1-0685-4D89-B655-521EA6C7B4DB.

Microsoft Corporation. Windows Vista Security Guide. (November 20, 2006) Retrieved January 15, 2007, from Microsoft TechNet, http://go.microsoft.com/fwlink/?LinkId=74028.

Microsoft Corporation. (2006). Retrieved January 14, 2007, from Microsoft Platform Software Development Kit, http://go.microsoft.com/fwlink ?LinkID=55774.

Microsoft Desktop Optimization Pack, www.microsoft.com/windowsvista/ getready/optimizeddesktop.mspx.

Microsoft's IIS Internet Information Services site, www.iis.net.

Microsoft SoftGrid, www.softricity.com/index.asp.

J. Moskowitz Group Policy, Profiles, and IntelliMirror for WindowsVista, Win-dows2003, WindowsXP, and Windows2000, 4th Edition. (2007). Sybex.

Ponemon Institute. Ponemon Institute. (2007). Retrieved January 22, 2007, www.ponemon.org.

M. E. Russinovich & David A. Solomon, Microsoft Windows Internals 4th Ed., (2004). Microsoft Press.

Server and Domain Isolation Tech Center, www.microsoft.com/sdisolation.

Shatter Attack, www.microsoft.com/technet/security/bulletin/MS02-071.msp.

SoftGrid Demo, http://blogs.technet.com/kevinsul_blog/archive/2006/ 09/06/454467.aspx.

SQL Slammer worm information, http://en.wikipedia.org/wiki/ SQL_slammer_worm.

Threat Code, www.threatcode.com.

User Account Control Overview, www.microsoft.com/technet/technetmag/ issues/2006/11/UAC/default.aspx.

Windows Resource Protection, http://msdn.microsoft.com/library/en-us/dnlong/html/AppComp.asp?frame=true#appcomp_topic6.

Windows Vista Restart Manager, http://msdn.microsoft.com/library/ en-us/rstmgr/rstmgr/portal.asp.

Writing Services for Compatibility with Windows Vista, http://www.microsoft.com/whdc/system/vista/services.mspx.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.34.85