Abstract: Building
Secure Applications

This paper covers the recommended and alternate breakout sessions that contain valuable information that you can use to exploit the current and upcoming security infrastructure in the Windows NT® operating system. This paper contains a brief overview of Microsoft's security strategy, followed by day-by-day descriptions of the breakout sessions that you will want to attend.