Flylib.com
index_L
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]
L2TP (Layer 2 Tunneling Protocol)
laptops
chain locks and
educating users about traveling with
lost-and-found scenario at Sea-Tac airport
protecting, using multilayered approach
as risk factors 2nd
securing
Layer 2 Tunneling Protocol (L2TP)
layered security
LDAP (Lightweight Directory Access Protocol) interface
LM (LAN Manager)
configuring
disabling NTLM variants
disabling storage of password hashes
history of
LMCompatibility parameter
local file security for shared computers
Local Group Policy
Local Security Policy snap-in (MMC)
lock icon (public key cryptography)
locks
account lockout policies
controlling security vulnerabilities 2nd
for laptops 2nd 3rd
for wiring closets
logon auditing on domain controllers, configuring
logon events, auditing
logon process using smart cards
logon scripts
enrolling /installing certificates with
stored in domain controllers
Logon Workstations attribute
configuring
logs
analyzing DHCP logs
clearing when full
for IPSec-generated events, examining
providing forensic evidence of attacks
reviewing web server logs
security/system logs used in auditing
lost private keys, restoring
lost smart cards
LSDOU (local, site, domain, organizational unit)
Previous page
Table of content
Next page
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139
Authors:
Mike Danseglio
BUY ON AMAZON
Developing Tablet PC Applications (Charles River Media Programming)
Math and Random Number Functions in VB .NET
Using Gestures to Control Tablet Media Player
Custom Grammars for Speech Recognition
WMI and Hardware
Not Quite a Magic Ball
101 Microsoft Visual Basic .NET Applications
Working with the Microsoft Visual Basic .NET Language
Building Enterprise Services Applications
COM Interop/PInvoke
Securing Applications
Windows Server 2003 for .NET Developers
802.11 Wireless Networks: The Definitive Guide, Second Edition
Problems with WEP
Dynamic WEP
Characteristics of the OFDM PHY
General Structure of an 802.11 Interface
Current Trends in Wireless Networking
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Querying WMI
The WMI Schema
WMI Providers
The Oracle Hackers Handbook: Hacking and Defending Oracle
Oracle and PL/SQL
Indirect Privilege Escalation
Attacking Oracle PL/SQL Web Applications
Running Operating System Commands
Appendix A Default Usernames and Passwords
MPLS Configuration on Cisco IOS Software
Command Reference
Option 1: Inter-Provider VPN Using Back-to-Back VRF Method
Implementing AToM for Like to Like Circuits
Case Study 3: Implementing Layer 2 VPNs over Inter-AS Topologies Using Layer 2 VPN Pseudo-Wire Switching
Case Study 4: Implementing Layer 3 VPNs over Layer 2 VPN Topologies and Providing L2 VPN Redundancy
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies