Additional Resources
These resources contain additional information and tools related to this chapter.
Chapter 2, includes an overview of malware.
Chapter 4, includes more information about application compatibility.
Chapter 20, includes more information about protecting Internet Explorer.
Chapter 23, includes information about deploying WSUS.
Chapter 26, includes more information about Windows Service Hardening.
Chapter 29, includes information about running System Restore.
“Behavioral Modeling of Social Engineering–Based Malicious Software” at http://www.microsoft.com/downloads/details.aspx?FamilyID=e0f27260-58da-40db-8785-689cf6a05c73 includes information about social engineering attacks.
“Windows 7 Security Compliance Management Toolkit” at http://go.microsoft.com/fwlink/?LinkId=156033 ...
Get Windows® 7 Resource Kit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.