Читаем Windows® Internals, Sixth Edition, Part 1 полностью

OObCheckObjectAccess function, Access ChecksObDereferenceObjectWithTag function, Object Retentionobject access auditing, Security Auditing, Object Access Auditingdemonstrating, Object Access Auditingobject attribute flags, Object Headers and Bodiesobject attributes, Objects and Handles, Object Headers and Bodiesdefined, Objects and Handlesobject bodies, Object Structure, Object Headers and Bodiesformat and contents, Object Headers and Bodiesobject directories, Object Namesobject directory objects, Object Namesobject handles, Object Methodsobject headers, Object Structure, Object Headers and Bodies, Type Objects, Object Retentionoffsets, Object Headers and Bodiesquota charges attribute, Object Retentionviewing, Type ObjectsObject Identifiers (OIDs), User Logon Stepsobject leaks, Object Retentionobject manager, Objects and Handles, Executive, Service Descriptor Tables, Service Descriptor Tables, Object Manager, Object Manager, Object Structure, Object Headers and Bodies, Object Headers and Bodies, Object Headers and Bodies, Type Objects, Object Methods, Object Methods, Reserve Objects, Object Security, Object Security, Object Security, Object Names, Object Names, Object Names, Object Directories, Object Directories, Object Directories, Session Namespace, Object Filtering, Pushlocks, Kernel Patch Protection, Worker Factories (Thread Pools), Protecting Objects, Protecting Objects, Access Checks, Security Descriptors and Access Control, Security Auditingaccess permissions, recording, Protecting Objectsaccess rights checking and storage, Reserve Objectsaudit event creation, Security Auditingexploring, Service Descriptor Tablesfiltering, Kernel Patch Protectionfinding objects, Object Methodsgeneric services, Object Headers and Bodiesgoals, Object Managerhandle creation, Object Methodskernel-managed thread pools, Worker Factories (Thread Pools)name lookups, Object Names, Object Directoriesnamespace, Object Managernamespace management, Session Namespaceobject directory object, Object Namesobject filtering, Object Filteringobject header and subheader access, Object Headers and Bodiesobject header control, Object Structureobject method calls, Type Objectsobject naming requirements, Object Namesobject retention, Object Securityobject security enforcement, Protecting Objectsopen handle counter, incrementing, Object Securitypushlock use, Pushlocksreference count, incrementing, Object Securityremote file access, Object Directoriessecurity access validation, Access Checkssecurity descriptor management, Security Descriptors and Access Controlsymbolic link object, Object Directoriestype objects, Object Headers and BodiesObject Manager (CIMOM), WMI Architectureobject methods, Objects and Handles, Type Objects, Type Objects, Object Methods, Object Methods, Object Methods, Object Methods, Object Methods, Object Methods, Object Methodsclose method, Object Methodsdefined, Objects and Handlesdelete method, Object Methodsokay-to-close method, Object Methodsopen method, Object Methodsparse method, Object Methodsquery name method, Object Methodssecurity method, Object Methodssecurity routine, Type Objectsobject name squatting, Object Directoriesobject owners, write-DACL access, Determining Accessobject protection mechanisms, Protecting Objects, Protecting Objects, Access Checks, Security Identifiers, Tokens, Impersonation, Impersonation, Impersonation, Virtual Service Accounts, Security Descriptors and Access Control, Security Descriptors and Access Control, User Logon Stepsaccess checks, Protecting Objectsaccess control, Security Descriptors and Access Controlassured authentication, User Logon Stepsfiltered admin tokens, Impersonationimpersonation, Impersonationintegrity levels, Security Identifiersrestricted tokens, Impersonationsecurity descriptors, Security Descriptors and Access ControlSIDs, Access Checkstokens, Tokensvirtual service accounts, Virtual Service Accountsobject reference tagging, Object Retentionobject reference tracing, Object Retentionobject retention, Object Securityobject reuse protection, Trusted Computer System Evaluation Criteriaobject security locks, Access Checksobject subheaders, Object Structure, Object Headers and Bodiesconditions required for, Object Headers and Bodiesobject types, defined, Terminal Services and Multiple SessionsObject Viewer, Digging into Windows Internalsobject-oriented design, Operating System ModelObjectAttributes parameter, Objects and HandlesObjectName parameter, Service Applications, Service Startupobjects, Terminal Services and Multiple Sessions, Terminal Services and Multiple Sessions, Objects and Handles, Objects and Handles, Objects and Handles, Security, Executive, Executive, Object Manager, Object Structure, Object Headers and Bodies, Object Headers and Bodies, Type Objects, Type Objects, Type Objects, Object Methods, Reserve Objects, Reserve Objects, Reserve Objects, Object Security, Object Security, Object Retention, Object Retention, Object Retention, Object Names, Object Names, Object Directories, Object Directories, Object Filtering, Waiting for Dispatcher Objects, Data Structures, Data Structures, WMI Architecture, The WMI Namespace, Dynamic Processor Addition and Replacement, Protecting Objects, Access Checks, Access Checks, Access Checks, Access Checks, Integrity Levels, Integrity Levels, Security Descriptors and Access Control, Security Descriptors and Access Control, ACL Assignment, Determining Access, Determining Access, Determining Access, Caching Modesaccess, determining, ACL AssignmentACL assignment, Security Descriptors and Access Controladdress ordering, Data Structuresbase named, viewing, Object Directoriescaching modes, Caching Modescreate, open, and query services, Object Headers and Bodiesdefault security, Access Checksdeferred delete operations, Object Retentiondefined, Terminal Services and Multiple Sessionsdeleting, Object Retentiondesired access rights, Reserve Objectsdispatcher objects, Type Objectsexecutive-level, Executiveexisting handles, referencing by, Access Checksfiltering, Object Filteringintegrity levels, Integrity Levelsintegrity protection, Objects and Handlesinternal structure, Objects and Handlesjob, Dynamic Processor Addition and Replacementkernel, Executivelocating in namespaces, The WMI Namespacelocking order, Data Structuresmanagement, WMI Architecture(see also object manager)mandatory policies, Integrity Levelsnaming, Object Names, Object Directoriesopen handle counter, Object Securityopening by name, Access Checksoperating system tasks, Objects and Handlesowner rights, Determining Accessprivate, Access Checksprotection, Securityreferencing, Object Methodsreserve, Reserve Objectsresource accounting, Object Retentionsecurity, Reserve Objectssecurity descriptors, Protecting Objects, Security Descriptors and Access Controlsecurity routine, Type Objectssecurity settings, viewing, Determining Accesssharing in global namespace, Object Namessignaled state, defining, Waiting for Dispatcher Objectsstructure, Object Structuresynchronization support, Type Objectstemporary and permanent, Object Securitytype objects, Object Headers and Bodiestypes, Object Managerwrite-DACL access, Determining AccessOBJECT_ATTRIBUTES, Birth of a ThreadObpCreateHandle function, Access ChecksObReferenceObjectByHandle function, Access ChecksObReferenceObjectWithTag function, Object RetentionOCI (open cryptographic interface), RPC OperationODBC (Open Database Connectivity) adapter, WMI ArchitectureOffline (Need to Sync) caching mode, Offline (Working Offline)Offline (Not Connected) caching mode, Offline (Working Offline)Offline (Slow Connection) caching mode, Caching ModesOffline (Working Offline) caching mode, Offline (Working Offline)Offline Files, Surrogate Providers, Mini-Redirectors, Offline Files, Offline Files, Offline Files, Offline Files, Offline Files, Offline Files, Caching Modes, Offline (Working Offline), Ghosts, Ghosts, Ghosts, Configurationarchitecture, Offline Filescache, Offline Filescache structure, Ghostscaching modes, Caching Modescapabilities, Mini-Redirectorscomponents, Offline Filesdata security, Ghostsghosts, GhostsGroup Policy settings, Offline (Working Offline)limitations, Offline Filesobject types, Offline Filesprefetching files, ConfigurationOffline Registry Library, Viewing and Changing the RegistryOffreg.dll, Viewing and Changing the RegistryOIDs (Object Identifiers), User Logon Stepsokay-to-close method, Object Methodson-demand problem diagnosis, Windows Diagnostic Infrastructureone-time initialization, Run Once InitializationOney, Walter, Windows Driver Kitonline caching mode, Caching Modesopen cryptographic interface (OCI), RPC OperationOpen Database Connectivity (ODBC) adapter, WMI Architectureopen handle counter, Object Securityopen method calls, Object Methodsopen object APIs, problems with, Object SecurityOpen Software Foundation (Open Group), WSK ImplementationOpen Systems Interconnection (OSI) model, The OSI Reference ModelOpenfiles /query command, Service Descriptor TablesOpenSCManager function, Interactive Services and Session 0 Isolationoperating systems, Virtual Memory, Kernel Mode vs. User Mode, Objects and Handles, Checked Build, Hypervisor (Hyper-V), Hypervisor (Hyper-V), Hypervisor (Hyper-V), Partitions, Virtual Machine Manager Service and Worker Processes, Child Partitions, Synthetic Devices, Dynamic Processor Addition and Replacement, Dynamic Processor Addition and Replacement, Security, Running with Administrator Rights, Network Access Protection(see also Windows operating system)administrative rights, requesting, Running with Administrator Rightschild partitions, Virtual Machine Manager Service and Worker Processesdynamic processor support, Dynamic Processor Addition and Replacementenlightenments, Hypervisor (Hyper-V), Child Partitionshypervisor component, Hypervisor (Hyper-V)(see also hypervisor (Hyper-V))logical processors, Synthetic Devices(see also logical processors)parent partition, PartitionsProcessorAdd callback, Dynamic Processor Addition and Replacementsecurity ratings, Securitysoftware, kernel-mode execution, Kernel Mode vs. User Modetasks, objects role in, Objects and Handlesupdates and antivirus signatures, Network Access Protectionvirtual memory space, Virtual Memoryvirtualization, Hypervisor (Hyper-V)operations, administrative rights for, Registry VirtualizationOrange Book, SecurityOrwick, Penny, Windows Driver KitOSI reference model, The OSI Reference Modelover-the-shoulder (OTS) elevations, Running with Administrator RightsOwner Rights SID, Determining Access

Перейти на страницу:

Похожие книги