Additional Resources
These resources contain additional information and tools related to this chapter.
Related Information
Chapter 2, includes an overview of malware.
Chapter 4, includes more information about application compatibility.
Chapter 21, includes more information about protecting Internet Explorer.
Chapter 24, includes information about deploying WSUS.
Chapter 27, includes more information about Windows Service Hardening.
Chapter 30, includes information about running System Restore.
"Behavioral Modeling of Social Engineering–Based Malicious Software" at http://www.microsoft.com/downloads/details.aspx?FamilyID=e0f27260-58da-40db-8785-689cf6a05c73 includes information about social-engineering attacks.
"Windows Vista Security Guide" at http://www.microsoft.com/downloads/details.aspx?FamilyID=a3d1bbed-7f35-4e72-bfb5-b84a526c1565 ...
Get Windows Vista® Resource Kit, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.