References

64-bit Anti-Virus Software, http://msinfluentials.com/blogs/jesper/ archive/2007/02/17/64-bit-anti-virus-for-vista.aspx.

K. J. Biba Integrity considerations for secure computer systems, Technical Report MTR-3153. (1975). Bedford, MA: Mitre Corporation.

Blaster worm information, http://en.wikipedia.org/wiki/Blaster_worm.

T. Bollefer, G. Chander, J. Johansson, M. Kass, & E. Olson Building and Configuring More Secure Web Sites. (December, 2002). Retrieved February 20, 2007, from Microsoft Developer Network, http://msdn2.microsoft.com/en-us/library/aa302370.aspx.

N. Bowditch The American Practical Navigator. (1802). Paradise Cay Publications.

S. Bradley (2006). Retrieved January 14, 2007, from ThreatCode: www.threatcode.com.

Brett Hill's IIS Answers.com, www.iisanswers.com.

K. Brown (2006). Retrieved January 14, 2007, from Hall of Shame, www.pluralsite.com/wiki/default.aspx/Keith/HallOfShame.html.

The Cable Guy. AuthIP In Windows Vista. (August 1, 2006). Retrieved Fnebruary 19, 2007, from Microsoft TechNet, www.microsoft.com/technet/community/columns/cableguy/cg0806.mspx.

Desktop Isolation Security Bulletin, www.microsoft.com/technet/security/ bulletin/MS00-020.msp.

R. Flaming UAC in MSI Notes.(September 20, 2006). Retrieved January 14, 2007, from Microsoft Developer Network, http://blogs.msdn.com/rflaming/archive/2006/09/20/763945.aspx.

J. D. Fry D: Notebook.(2005) Retrieved January 14, 2007, from Wall Street Journal Online, http://online.wsj.com/public/article/SB111684809888140520-uxjBS77gsFQvsi4ikXZzNxZjpd8_20060523.html?mod=blogs. ...

Get WINDOWS VISTA™ SECURITY: Securing Vista Against Malicious Attacks now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.