This section contains the following topics:
Securing Resources
About Resources
Resource Descriptor Table
Assigning Ownership
Resource Access Control
VM Protection Examples
Using an Updated Security Record