Windows 10 System Programming, Part 2
$24.50
Minimum price
$36.95
Suggested price

Windows 10 System Programming, Part 2

About the Book

About the Author

Bundles that include this book

$74.90
Bought separately
$39.50
Bundle Price

Table of Contents

  • Introduction
    • Who Should Read This Book
    • What You Should Know to Use This Book
    • Sample Code
  • Chapter 13: Working With Memory
    • Memory APIs
    • The VirtualAlloc* Functions
      • Decommitting / Releasing Memory
    • Reserving and Committing Memory
      • The Micro Excel Application
    • Working Sets
      • The Working Sets Application
    • Heaps
      • Private Heaps
      • Heap Types
      • Heap Debugging Features
      • The C/C++ Runtime
      • The Local/Global APIs
      • Other Heap Functions
    • Other Virtual Functions
      • Memory Protection
      • Locking Memory
      • Memory Block Information
      • Memory Hint Functions
    • Writing and Reading to/from Other Processes
    • Large Pages
    • Address Windowing Extensions
    • NUMA
    • The VirtualAlloc2 Function
    • Summary
  • Chapter 14: Memory Mapped Files
    • Introduction
    • Mapping Files
      • The filehist Application
    • Sharing Memory
      • Sharing Memory with File Backing
    • The Micro Excel 2 Application
    • Other Memory Mapping Functions
    • Data Coherence
    • Summary
  • Chapter 15: Dynamic Link Libraries
    • Introduction
    • Building a DLL
    • Implicit and Explicit Linking
      • Implicit Linking
      • Explicit Linking
      • Calling Conventions
      • DLL Search and Redirection
    • The DllMain Function
    • DLL Injection
      • Injection with Remote Thread
      • Windows Hooks
      • DLL Injecting and Hooking with SetWindowsHookEx
    • API Hooking
      • IAT Hooking
      • “Detours” Style Hooking
    • DLL Base Address
    • Delay-Load DLLs
    • The LoadLibraryEx Function
    • Miscellaneous Functions
    • Summary
  • Chapter 16: Security
    • Introduction
      • WinLogon
      • LogonUI
      • LSASS
      • LsaIso
      • Security Reference Monitor
      • Event Logger
    • SIDs
    • Tokens
      • The Secondary Logon Service
      • Impersonation
      • Impersonation in Client/Server
    • Privileges
      • Super Privileges
    • Access Masks
    • Security Descriptors
      • The Default Security Descriptor
      • Building Security Descriptors
    • User Access Control
      • Elevation
      • Running As Admin Required
      • UAC Virtualization
    • Integrity Levels
      • UIPI
    • Specialized Security Mechanisms
      • Control Flow Guard
      • Process Mitigations
    • Summary
  • Chapter 17: The Registry
    • The Hives
      • HKEY_LOCAL_MACHINE
      • HKEY_USERS
      • HKEY_CURRENT_USER (HKCU)
      • HKEY_CLASSES_ROOT (HKCR)
      • HKEY_CURRENT_CONFIG (HKCC)
      • HKEY_PERFORMANCE_DATA
    • 32-bit Specific Hives
    • Working with Keys and Values
      • Reading Values
      • Writing Values
      • Deleting Keys and Values
      • Creating Registry Links
      • Enumerating Keys and Values
    • Registry Notifications
    • Transactional Registry
    • Registry and Impersonation
    • Remote Registry
    • Miscellaneous Registry Functions
    • Summary
  • Chapter 18: Pipes and Mailslots
    • Mailslots
      • Mailslot Clients
      • Multi-Mailslot Communication
    • Anonymous Pipes
      • The Command Redirect Application
    • Named Pipes
      • Pipe Client
      • The Pipe Calculator Application
      • Other Pipe Functions
    • Summary
  • Chapter 19: Services
    • Services Overview
    • Service Process Architecture
    • A Simple Service
      • Installing the Service
      • A Service Client
    • Controlling Services
      • Installing a Service
      • Starting a Service
      • Stopping a Service
      • Uninstalling the Service
    • Service Status and Enumeration
      • The enumsvc Application
    • Service Configuration
      • Service Description
      • Failure Actions
      • Pre-Shutdown Information
      • Delayed Auto-Start
      • Trigger Information
      • Preferred NUMA Node
      • Launch as PPL
    • Debugging Services
      • Interactive Services
    • Service Security
      • Service SID
      • Service Security Descriptor
    • Per-User Services
    • Miscellaenous Functions
    • Summary
  • Chapter 20: Debugging and Diagnostics
    • Debugger Output
      • The DebugPrint Application
    • Performance Counters
      • Working with Counters
      • The QSlice Application
    • Process Snapshots
      • Querying a Snapshot
      • The snapproc Application
    • Event Tracing for Windows
      • Creating ETW Sessions
      • Processing Traces
      • Real-Time Event Processing
      • The Kernel Provider
      • More ETW
    • Trace Logging
      • Publishing Events with Trace Logging
    • Debuggers
      • A Simple Debugger
      • More Debugging APIs
      • Writing a Real Debugger
    • Summary
  • Chapter 21: The Component Object Model
    • What is COM?
    • Interfaces and Implementations
    • The IUnknown Interface
    • HRESULTs
    • COM Rules (pun intended)
    • COM Clients
      • Step 1: Initialize COM
      • Step 2: Create the BITS Manager
      • Step 3: Create a BITS Job
      • Step 4: Add a Download
      • Step 5: Initiate the Transfer
      • Step 6: Wait for Transfer to Complete
      • Step 7: Display Results
      • Step 8: Clean Up
    • COM Smart Pointers
      • Querying for Interfaces
    • CoCreateInstance Under the Hood
      • CoGetClassObject
    • Implementing COM Interfaces
    • COM Servers
      • Implementing the COM Class
      • Implementing the Class Object (Factory)
      • Implementing DllGetClassObject
      • Implementing Self Registration
      • Registering the Server
      • Debugging Registration
      • Testing the Server
      • Testing with non C/C++ Client
    • Proxies and Stubs
    • IDL and Type Libraries
    • Threads and Apartments
      • The Free Threaded Marshalar (FTM)
    • Odds and Ends
    • Summary
  • Chapter 22: The Windows Runtime
    • Introduction
    • Working with WinRT
      • The IInspectable interface
    • Language Projections
      • C++/WinRT
      • Asynchronous Operations
      • Other Projections
    • Summary
  • Chapter 23: Structured Exception Handling
    • Termination Handlers
      • Replacing Termination Handlers with RAII
    • Exception Handling
      • Simple Exception Handling
      • Using EXCEPTION_CONTINUE_EXECUTION
    • Exception Information
    • Unhandled Exceptions
      • Just in Time Debugging
      • Windows Error Reporting (WER)
    • Vectored Exception Handling
    • Software Exceptions
      • High-Level Exceptions
      • Visual Studio Exception Settings
    • Summary
    • Book Summary

The Leanpub 60 Day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

So, there's no reason not to click the Add to Cart button, is there?

See full terms...

Earn $8 on a $10 Purchase, and $16 on a $20 Purchase

We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub