Windows 10 System Programming, Part 2
Windows 10 System Programming, Part 2
About the Book
Bundles that include this book
Table of Contents
-
Introduction
- Who Should Read This Book
- What You Should Know to Use This Book
- Sample Code
-
Chapter 13: Working With Memory
- Memory APIs
-
The
VirtualAlloc*
Functions- Decommitting / Releasing Memory
-
Reserving and Committing Memory
- The Micro Excel Application
-
Working Sets
- The Working Sets Application
-
Heaps
- Private Heaps
- Heap Types
- Heap Debugging Features
- The C/C++ Runtime
- The Local/Global APIs
- Other Heap Functions
-
Other
Virtual
Functions- Memory Protection
- Locking Memory
- Memory Block Information
- Memory Hint Functions
- Writing and Reading to/from Other Processes
- Large Pages
- Address Windowing Extensions
- NUMA
-
The
VirtualAlloc2
Function - Summary
-
Chapter 14: Memory Mapped Files
- Introduction
-
Mapping Files
- The filehist Application
-
Sharing Memory
- Sharing Memory with File Backing
- The Micro Excel 2 Application
- Other Memory Mapping Functions
- Data Coherence
- Summary
-
Chapter 15: Dynamic Link Libraries
- Introduction
- Building a DLL
-
Implicit and Explicit Linking
- Implicit Linking
- Explicit Linking
- Calling Conventions
- DLL Search and Redirection
-
The
DllMain
Function -
DLL Injection
- Injection with Remote Thread
- Windows Hooks
-
DLL Injecting and Hooking with
SetWindowsHookEx
-
API Hooking
- IAT Hooking
- “Detours” Style Hooking
- DLL Base Address
- Delay-Load DLLs
-
The
LoadLibraryEx
Function - Miscellaneous Functions
- Summary
-
Chapter 16: Security
-
Introduction
- WinLogon
- LogonUI
- LSASS
- LsaIso
- Security Reference Monitor
- Event Logger
- SIDs
-
Tokens
- The Secondary Logon Service
- Impersonation
- Impersonation in Client/Server
-
Privileges
- Super Privileges
- Access Masks
-
Security Descriptors
- The Default Security Descriptor
- Building Security Descriptors
-
User Access Control
- Elevation
- Running As Admin Required
- UAC Virtualization
-
Integrity Levels
- UIPI
-
Specialized Security Mechanisms
- Control Flow Guard
- Process Mitigations
- Summary
-
Introduction
-
Chapter 17: The Registry
-
The Hives
- HKEY_LOCAL_MACHINE
- HKEY_USERS
- HKEY_CURRENT_USER (HKCU)
- HKEY_CLASSES_ROOT (HKCR)
- HKEY_CURRENT_CONFIG (HKCC)
- HKEY_PERFORMANCE_DATA
- 32-bit Specific Hives
-
Working with Keys and Values
- Reading Values
- Writing Values
- Deleting Keys and Values
- Creating Registry Links
- Enumerating Keys and Values
- Registry Notifications
- Transactional Registry
- Registry and Impersonation
- Remote Registry
- Miscellaneous Registry Functions
- Summary
-
The Hives
-
Chapter 18: Pipes and Mailslots
-
Mailslots
- Mailslot Clients
- Multi-Mailslot Communication
-
Anonymous Pipes
- The Command Redirect Application
-
Named Pipes
- Pipe Client
- The Pipe Calculator Application
- Other Pipe Functions
- Summary
-
Mailslots
-
Chapter 19: Services
- Services Overview
- Service Process Architecture
-
A Simple Service
- Installing the Service
- A Service Client
-
Controlling Services
- Installing a Service
- Starting a Service
- Stopping a Service
- Uninstalling the Service
-
Service Status and Enumeration
- The enumsvc Application
-
Service Configuration
- Service Description
- Failure Actions
- Pre-Shutdown Information
- Delayed Auto-Start
- Trigger Information
- Preferred NUMA Node
- Launch as PPL
-
Debugging Services
- Interactive Services
-
Service Security
- Service SID
- Service Security Descriptor
- Per-User Services
- Miscellaenous Functions
- Summary
-
Chapter 20: Debugging and Diagnostics
-
Debugger Output
- The DebugPrint Application
-
Performance Counters
- Working with Counters
- The QSlice Application
-
Process Snapshots
- Querying a Snapshot
- The snapproc Application
-
Event Tracing for Windows
- Creating ETW Sessions
- Processing Traces
- Real-Time Event Processing
- The Kernel Provider
- More ETW
-
Trace Logging
- Publishing Events with Trace Logging
-
Debuggers
- A Simple Debugger
- More Debugging APIs
- Writing a Real Debugger
- Summary
-
Debugger Output
-
Chapter 21: The Component Object Model
- What is COM?
- Interfaces and Implementations
-
The
IUnknown
Interface - HRESULTs
- COM Rules (pun intended)
-
COM Clients
- Step 1: Initialize COM
- Step 2: Create the BITS Manager
- Step 3: Create a BITS Job
- Step 4: Add a Download
- Step 5: Initiate the Transfer
- Step 6: Wait for Transfer to Complete
- Step 7: Display Results
- Step 8: Clean Up
-
COM Smart Pointers
- Querying for Interfaces
-
CoCreateInstance
Under the Hood-
CoGetClassObject
-
- Implementing COM Interfaces
-
COM Servers
- Implementing the COM Class
- Implementing the Class Object (Factory)
-
Implementing
DllGetClassObject
- Implementing Self Registration
- Registering the Server
- Debugging Registration
- Testing the Server
- Testing with non C/C++ Client
- Proxies and Stubs
- IDL and Type Libraries
-
Threads and Apartments
- The Free Threaded Marshalar (FTM)
- Odds and Ends
- Summary
-
Chapter 22: The Windows Runtime
- Introduction
-
Working with WinRT
-
The
IInspectable
interface
-
The
-
Language Projections
- C++/WinRT
- Asynchronous Operations
- Other Projections
- Summary
-
Chapter 23: Structured Exception Handling
-
Termination Handlers
- Replacing Termination Handlers with RAII
-
Exception Handling
- Simple Exception Handling
-
Using
EXCEPTION_CONTINUE_EXECUTION
- Exception Information
-
Unhandled Exceptions
- Just in Time Debugging
- Windows Error Reporting (WER)
- Vectored Exception Handling
-
Software Exceptions
- High-Level Exceptions
- Visual Studio Exception Settings
- Summary
- Book Summary
-
Termination Handlers
The Leanpub 60 Day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.
You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!
So, there's no reason not to click the Add to Cart button, is there?
See full terms...
Earn $8 on a $10 Purchase, and $16 on a $20 Purchase
We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them