Additional Resources
These resources contain additional information and tools related to this chapter.
Chapter 2, includes an overview of malware.
Chapter 4, includes more information about application compatibility.
Chapter 20, includes more information about protecting Internet Explorer.
Chapter 23, includes information about deploying WSUS.
Chapter 26, includes more information about Windows Service Hardening.
Chapter 29, includes information about running System Restore.
“Behavioral Modeling of Social Engineering–Based Malicious Software” at http://www.microsoft.com/downloads/details.aspx?FamilyID=e0f27260-58da-40db-8785-689cf6a05c73 includes information about social engineering attacks.
“Windows 7 Security Compliance Management Toolkit” at http://go.microsoft.com/fwlink/?LinkId=156033 ...