Windows Internals
w65CAwAAQBAJ
752
By:"Mark E. Russinovich","David A. Solomon","Alex Ionescu"
"Computers"
Published on 2012-03-15 by Pearson Education
By default, the security descriptor on the \u003cb\u003eSAM key\u003c/b\u003e is configured so that even the \u003cbr\u003e\nadministrator account doesn't have access. HKLM\\SECURITY stores systemwide \u003cbr\u003e\nsecurity policies and userrights assignments. HKLM\\SAM is linked into the ...
READ NOW
Delve inside Windows architecture and internals—and see how core components work behind the scenes. Led by three renowned internals experts, this classic guide is fully updated for Windows 7 and Windows Server 2008 R2—and now presents its coverage in two volumes. As always, you get critical insider perspectives on how Windows operates. And through hands-on experiments, you’ll experience its internal behavior firsthand—knowledge you can apply to improve application design, debugging, system performance, and support. In Part 1, you will: Understand how core system and management mechanisms work—including the object manager, synchronization, Wow64, Hyper-V, and the registry Examine the data structures and activities behind processes, threads, and jobs Go inside the Windows security model to see how it manages access, auditing, and authorization Explore the Windows networking stack from top to bottom—including APIs, BranchCache, protocol and NDIS drivers, and layered services Dig into internals hands-on using the kernel debugger, performance monitor, and other tools
This Book was ranked 30 by Google Books for keyword sam key.
The book is written in enfor NOT_MATURE
Read Ebook Now
true
true
Printed Version of this book available in
BOOK
Availability of Ebook version is true,"listPrice": {"amount": 31.99,"currencyCode": "USD"in falseor false
Public Domain Status false
Rating by
SAMPLE
false
Tidak ada komentar:
Posting Komentar