This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.
Learn more
Developer Network
Developer Network
Developer
Sign in
Subscriber portal
Get tools
Downloads
Visual Studio
SDKs
Trial software
Free downloads
Office resources
SharePoint Server 2013 resources
SQL Server 2014 Express resources
Windows Server 2012 resources
Programs
Subscriptions
Overview
Administrators
Students
Microsoft Imagine
Microsoft Student Partners
ISV
Startups
Events
Community
Magazine
Forums
Blogs
Channel 9
Documentation
APIs and reference
Dev centers
Samples
Retired content
We’re sorry. The content you requested has been removed. You’ll be auto redirected in 1 second.
MSDN Library
MSDN Library
MSDN Library
MSDN Library
Design Tools
Development Tools and Languages
Mobile and Embedded Development
.NET Development
Office development
Online Services
Open Specifications
patterns & practices
Servers and Enterprise Development
Speech Technologies
Web Development
Windows Desktop App Development
TOC
This documentation is archived and is not being maintained.
Security (General)
Windows ISV Software Security Defenses
Inspect Your Gadget
Security Development Lifecycle (SDL) Banned Function Calls
Regulatory Compliance Demystified
The Trustworthy Computing Security Development Lifecycle
Techniques for Securing Private Objects in Your Applications
Secure the Enterprise with 64-Bit Intel Architecture
HTTP-Based Cross-Platform Authentication via the Negotiate Protocol Part I - Network Infrastructure
HTTP-Based Cross-Platform Authentication via the Negotiate Protocol Part II - SPNEGO Tokens and the Negotiate Protocol
HTTP-Based Cross-Platform Authentication via the Negotiate Protocol Part III - SPNEGO Token Handler API
How to Use the Encrypting File System
Writing Error Messages for Security Features
Adding Revocation Providers to CryptoAPI for Identrus Applications
Windows Data Protection
SSPI/Kerberos Interoperability with GSSAPI
Microsoft Windows 2000 Public Key Infrastructure
The Windows Negotiation Extension and Writing NegoEx SSPs
Windows Vista Authentication Features and Changes for Developers
Utilizing the Windows 2000 Authorization Data in Kerberos Tickets for Access Control to Resources
Print
Export (
0
)
Print
Share
IN THIS ARTICLE