"Extra Information".txt

Here is some extra information on security.  Although these issues
  have come up in the past in discussion with developers of Win32
  apps, this isn't really a FAQ (Frequently Asked Questions) list,
  in that some of the issues below haven't come up that often.
  It's just extra information made available to you on this CD

From time to time when we answer questions that pertain to any of
  the issues below, we may refer to particular ranges of line
  numbers in this file as part of the discussion.  We may also
  upload to a Compuserve library (for example GO MSWIN32) updated
  versions of this file that would contain additional and/or more
  recent extra information

--- Getting started with security as a developer

  Among the first places to look would be:

    - "Inside Windows NT", by Custer, from MS Press, 1993, ISBN
      1-55615-481-X.  See pages 72-81

    - "Windows NT - Answer Book", by Groves, from MS Press, 1993,
      ISBN 1-55615-562-X.  See pages 44-141 and 187-190.  Much of
      this information is actually more tuned towards
      administrators and end-users, however developers may also
      find this information useful

    - The Windows NT Resource Guide (see on this CD the
      \doc\enduser\resource directory), chapter 3, which is pages
      51-92

    - The two-article "Inside Windows NT Security" series by Rob
      Reichel that appeared in Windows/DOS Developer's Journal.
      The first of the series appeared in the April 1993 issue
      beginning on page 6, the second appeared in the May 1993
      issue, pages 44-50

    - The Win32 .hlp file.  Click on "Functions and Overviews",
      choose Security, click the "Overview" button.  The first
      nine subtopics ("Terms" through "SIDs") need to be
      understood before moving on.  In particular see the diagram
      in the "Security Model" subtopic, that shows the
      relationship between Access Token and ACL.  Pages 84-92 of
      the Windows NT Resource Guide chapter 3 have examples
      showing how this relationship works

    - This sample, check_sd, is also useful in understanding
      Access Tokens and ACLs.  It shows what some actual examples
      of the data structures on your machine look like, how the
      different defines for building up Access Mask values may
      have been used, etc

--- Information on C2 security

  In the Windows NT Resource Guide (see on this CD the
    \doc\enduser\resource directory) on pages 52-54 is a summary
    of the C2 criteria.  This is a good place to start
    understanding the C2 criteria, as is "Inside Windows NT", by
    Custer, from MS Press, 1993, ISBN 1-55615-481-X.  See pages
    3-4, 74-76, 196, 330 and 370

  If more info is needed, the Government Printing Office
    (202)783-3238 provides copies of the Orange Book, GPO Stock
    Number 008-000-00461-7 at nominal charges.  Another reference
    is the book "Computer Security Basics", by Russel and Gangemi,
    from O'Reilly & Assoc, 1992, ISBN 0-937175-71-4.  This book
    has a 59 page chapter 6 (called "Inside the Orange Book")
    along with other information that may be useful to those
    working their way through each of the 121 pages in the Orange
    Book
