Integrity considerations for secure computer systems, Technical Report MTR-3153. (1975). Bedford, MA: Mitre Corporation.
Building and Configuring More Secure Web Sites. (December, 2002). Retrieved February 20, 2007, from Microsoft Developer Network, http://msdn2.microsoft.com/en-us/library/aa302370.aspx.
, , , , &2006). Retrieved January 14, 2007, from Hall of Shame, www.pluralsite.com/wiki/default.aspx/Keith/HallOfShame.html.
(AuthIP In Windows Vista. (August 1, 2006). Retrieved Fnebruary 19, 2007, from Microsoft TechNet, www.microsoft.com/technet/community/columns/cableguy/cg0806.mspx.
.UAC in MSI Notes.(September 20, 2006). Retrieved January 14, 2007, from Microsoft Developer Network, http://blogs.msdn.com/rflaming/archive/2006/09/20/763945.aspx.
D: Notebook.(2005) Retrieved January 14, 2007, from Wall Street Journal Online, http://online.wsj.com/public/article/SB111684809888140520-uxjBS77gsFQvsi4ikXZzNxZjpd8_20060523.html?mod=blogs.
Weblog. (2007). Retrieved January 14, 2007, from Microsoft Developer Network, http://blogs.msdn.com/michael_howard.
Frequently Asked Questions About Passwords.(October 12, 2005). Retrieved January 25, 2007, from Microsoft TechNet, www.microsoft.com/technet/community/columns/secmgmt/sm1005.mspx.
Help Wanted - Need "People People". (2006). TechNet Magazine, www.microsoft.com/technet/technetmag/issues/2006/07/SecurityWatch/ default.aspx
M.More options on protecting against recent IE vulnerabilities on a domain. (September 22, 2006). Retrieved February 14, 2007, from Jesper's Blog, http://msinfluentials.com/blogs/jesper/archive/2006/09/22/More-options-on-protecting-against-the-VML-vulnerability-on-a-domain.aspx.
Please Don't Disable Security Features, At Least While We Are Testing Them. (June 22, 2006). Retrieved January 14, 2007, from Microsoft TechNet, http://blogs.technet.com/jesper_johansson/archive/2006/06/22/438316 .aspx.
Weblog. (2007). Retrieved January 14, 2007, from Microsoft Developer Network, http://blogs.msdn.com/aaron_margosis/default.aspx.
Active Directory Schema Extensions for Windows Vista Wireless and Wired Group Policy Enhancements. (May 31, 2006) Retrieved January 20, 2007, from Microsoft TechNet, www.microsoft.com/technet/network/wifi/ vista_ad_ext.mspx.
ADMX Schema. (2007). Retrieved January 18, 2007, from Microsoft Developer Network, http://msdn2.microsoft.com/en-gb/ library/aa373476.aspx.
Certain Programs Do Not Work Correctly If You Log On Using A Limited User Account. (2006). Retrieved January 14, 2007, from Microsoft TechNet, http://support.microsoft.com/default.aspx?scid=kb;enus;307091.
Configuring Active Directory to Back up Windows Bit-Locker Drive Encryption and Trusted Platform Module Recovery Information. (January 9, 2007). Retrieved January 20, 2007, from Microsoft Download Center, www.microsoft.com/downloads/details.aspx?FamilyID=3a207915-dfc3-4579-90cd-86ac666f61d4.
The COM Elevation Moniker. (January 2007). Retrieved January 18, 2007, from Microsoft Developer Network, http:// msdn2.microsoft.com/en-us/library/ms679687.aspx.
Deploying Group Policy Using Windows Vista. (2007). Retrieved January 18, 2007, from Microsoft TechNet, http://go.microsoft .com/fwlink/?LinkId=77080.
Domain Isolation with Microsoft Windows explained. (2007). Retrieved February 19, 2007, from Microsoft TechNet, http://tech-net2.microsoft.com/WindowsVista/en/library/69cf3159-77ea-4a56-9808-a3f35d2ccc3f1033.mspx.
Group Policy Series: Group Policy Security Templates and IPSEC. (2004). Retrieved February 19, 2007, from Microsoft TechNet, www.microsoft.com/technet/community/chats/trans/windowsnet/wnet_11 2904b.mspx.
Group Policy Settings Reference for Windows Vista. (November 20, 2006). Retrieved January 15, 2007, from Microsoft.com, http://go.microsoft.com/fwlink/?LinkId=54020.
Security Configuration Guidance Support.(February 6, 2007) Retrieved February 14, 2007, from Microsoft Knowledge Base, http://support.microsoft.com/kb/885409/en-us.
Security Descriptor Definition Language. (2007) Retrieved February 14, 2007, from Microsoft Developer Network, http://msdn2.microsoft.com/en-us/library/aa379567.aspx.
ShellExecuteEx Function. (2007). Retrieved January 18, 2007, from Microsoft Developer Network, http://msdn.microsoft.com/ library/en-us/shellcc/platform/shell/reference/functions/ shellexecuteex.asp.
Step-By-Step Guide to Controlling Device Installation and Usage with Group Policy. (2007). Retrieved January 18, 2007, from Microsoft TechNet, http://go.microsoft.com/fwlink/?LinkId=75123.
Step-by-Step Guide to Managing Multiple Local Group Policy Objects. (2007) Retrieved January 16, 2007, from Microsoft TechNet, http://go.microsoft.com/fwlink/?LinkId=73434.
System-Supplied Device Setup Classes. (2007). Retrieved January 18, 2007, from Microsoft Developer Network, http://msdn2.microsoft .com/en-us/library/ms791130.aspx.
Troubleshooting Group Policy Using Event Logs. (2007) Retrieved January 20, 2007, from Microsoft TechNet, http://go.microsoft .com/fwlink/?LinkId=74139.
When you use Windows Server 2003 or Windows XP to modify a Windows Vista registry hive, Windows Vista registry key flags are removed. (January 10, 2007) Retrieved January 20, 2007, from Microsoft TechNet, http://support.microsoft.com/?kbid=926044.
Windows Server 2003 Group Policy. (2006). Retrieved January 15, 2007, from Microsoft TechNet, http://go.microsoft.com/fwlink/ ?linkid=15088.
Windows Server 2003 Security Guide. (May 18, 2006). Retrieved March 16, 2007, from Microsoft Download Center, www.microsoft .com/downloads/details.aspx?familyid=8A2643C1-0685-4D89-B655-521EA6C7B4DB.
Windows Vista Security Guide. (November 20, 2006) Retrieved January 15, 2007, from Microsoft TechNet, http://go.microsoft.com/fwlink/?LinkId=74028.
2006). Retrieved January 14, 2007, from Microsoft Platform Software Development Kit, http://go.microsoft.com/fwlink ?LinkID=55774.
(3.144.34.85