Flylib.com
Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163
BUY ON AMAZON
Table of Contents
Back Cover
Windows Vista Security-Securing Vista Against Malicious Attacks
Foreword
Introduction
Overview of the Book and Technology
How This Book Is Organized
Who Should Read This Book
Tools You Will Need
What s on the Web Site
Summary
Part I: Introducing Windows Vista
Chapter 1: New Security Features
Improved C Security
Address Space Layout Randomization
Data Execution Protection
Protected Processes
Windows Vista User Experience
Host-Based Security
Securing E-mail and the Internet
Securing Windows Networks
Group Policy
64-bit Only Improvements
Future Improvements
Summary
Best Practices
Chapter 2: How Hackers Attack
Where Windows Malware Hides
Why Malicious Hackers Hack
Summary
Chapter 3: Windows Infrastructure
Post-Boot Startup
Services You Need To Understand
Registry
Logon Authentication
Access Control
Summary
Part II: Host-Based Security
Chapter 4: User Account Control
Basics
The Case for Least Privilege
Admins Are Omnipotent
User Account Control Is More Than You Think
UAC and Remote Access
UAC Policy Configuration
Frequently Asked Questions About UAC
Leveraging User Account Control in Applications
Summary
Best Practices
Chapter 5: Managing Access Control
How an Access Control List Is Used
Major Access Control List Changes in Vista
Tools to Manage Access Control Lists
Registry ACLs
Summary
Best Practices
Chapter 6: Application Security
Restart Manager
ActiveX Installer Service
Antivirus
Desktop Optimization Pack
Summary
Best Practices
Chapter 7: Vista Client Protection
Malicious Software Removal Tool
Security Center
Windows Defender
Windows Live OneCare
Microsoft Forefront Client Security
Should Microsoft Be in the Anti-Malware Business?
Summary
Best Practices
Part III: Securing Internet and E-mail Access
Chapter 8: Securing Internet Explorer
New IE 7.0 Security Features
Internet Explorer Security Settings
Will Internet Explorer 7 Be Hacked A Lot?
Summary
Best Practices
Chapter 9: Introducing IIS 7
Introduction to IIS
New IIS Features
Installing IIS 7
IIS Components
IIS Protocol Listeners
Worker Processes, Application Pools, and Identities
IUSR and IIS_USRS
IIS Administration
IIS Authentication
Web Server Access Control Permissions
Defending IIS
Summary
Chapter 10: Protecting E-mail
Introducing Windows Mail
E-mail Defenses
Summary
Best Practices
Part IV: Securing Windows Networks
Chapter 11: Managing Windows Firewall
New Features
Firewall Management
Summary
Best Practices
Chapter 12: Server and Domain Isolation
Forget About the Perimeter
Network Threat Modeling
Changes in Windows Vista Affecting SDI
Summary
Best Practices
Chapter 13: Wireless Security
Wireless Threats
New Wireless Improvements in Vista
Securing Wireless Networks
Summary
Best Practices
Part V: Group Policy and Best Practices
Chapter 14: Using Group Policy
Updated Group Policy Features
New or Updated Group Policy Settings
Settings That Require Reboot or Logon
Windows Vista Security Guide
Active Directory Schema Updates
Managing Group Policy in a Mixed Environment
Rollout Strategy
Summary
Best Practices
Chapter 15: Thinking about Security
The Three-Step Approach to Security
Wetware
Summary
Best Practices
Appendix A: Building a Windows PE Boot Disk
Downloading WAIK
Building the WinPE Image
Appendix B: References
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P-Q
R
S
T
U
V
W
X-Y
Z
List of Figures
List of Tables
List of Sidebars
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Thriving in a Chaordic World
Practice: Customer Team-Developer Team Interface
Individual Performance
A Hub Organizational Structure
Self-Organization Extensions
Documenting Software Architectures: Views and Beyond
P.2. Uses of Architecture Documentation
Part I. Software Architecture Viewtypes and Styles
Summary Checklist
Discussion Questions
C&C Shared-Data View
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Installing Boost.Build
Converting Numbers to Strings
Padding a String
Finding the Greatest or Least Value in a Container
Evaluating an XPath Expression
Cisco IOS Cookbook (Cookbooks (OReilly))
Displaying Active Users
Using Policy-Based Routing to Route Based on Application Type
Changing the Default Log Facility
Preventing the Most Common Messages from Being Logged
Dynamically Allocating Client IP Addresses via DHCP
An Introduction to Design Patterns in C++ with Qt 4
Introduction to UML
Review Questions
Serializer Pattern Revisited
Section C.3. Debugging
Section C.4. Qt Assistant and Designer
Microsoft VBScript Professional Projects
Errors, Constants, and Variables
Arrays
VBScript and the WSH
Scheduling Disk Maintenance
Developing a Setup Script
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies