References

64-bit Anti-Virus Software, http://msinfluentials.com/blogs/jesper/ archive/2007/02/17/64-bit-anti-virus-for-vista.aspx.

K. J. Biba Integrity considerations for secure computer systems, Technical Report MTR-3153. (1975). Bedford, MA: Mitre Corporation.

Blaster worm information, http://en.wikipedia.org/wiki/Blaster_worm.

T. Bollefer, G. Chander, J. Johansson, M. Kass, & E. Olson Building and Configuring More Secure Web Sites. (December, 2002). Retrieved February 20, 2007, from Microsoft Developer Network, http://msdn2.microsoft.com/en-us/library/aa302370.aspx.

N. Bowditch The American Practical Navigator. (1802). Paradise Cay Publications.

S. Bradley (2006). Retrieved January 14, 2007, from ThreatCode: www.threatcode.com.

Brett Hill's IIS Answers.com, www.iisanswers.com.

K. Brown (2006). Retrieved January 14, 2007, from Hall of Shame, www.pluralsite.com/wiki/default.aspx/Keith/HallOfShame.html.

The Cable Guy. AuthIP In Windows Vista. (August 1, 2006). Retrieved Fnebruary 19, 2007, from Microsoft TechNet, www.microsoft.com/technet/community/columns/cableguy/cg0806.mspx.

Desktop Isolation Security Bulletin, www.microsoft.com/technet/security/ bulletin/MS00-020.msp.

R. Flaming UAC in MSI Notes.(September 20, 2006). Retrieved January 14, 2007, from Microsoft Developer Network, http://blogs.msdn.com/rflaming/archive/2006/09/20/763945.aspx.

J. D. Fry D: Notebook.(2005) Retrieved January 14, 2007, from Wall Street Journal Online, http://online.wsj.com/public/article/SB111684809888140520-uxjBS77gsFQvsi4ikXZzNxZjpd8_20060523.html?mod=blogs. ...

Get WINDOWS VISTA™ SECURITY: Securing Vista Against Malicious Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.