Flylib.com
Securing Windows Server 2003
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139
Authors:
Mike Danseglio
BUY ON AMAZON
Securing Windows Server 2003
Table of Contents
Copyright
Preface
What s in This Book?
Audience
About This Book
Assumptions This Book Makes
Conventions Used in This Book
Comments and Questions
Acknowledgments
Chapter 1. Introduction to Windows Server 2003 Security
1.1 What Is Security?
1.2 What Is Windows Server 2003?
1.3 Security Design in Windows Server 2003
1.4 Security Features in the Windows Server 2003 Family
1.5 Summary
Chapter 2. Basics of Computer Security
2.1 Why Computer Security Is Important
2.2 Security Enforcement Mechanisms
2.3 POLA: The Principle of Least Access
2.4 Key-Based Cryptography
2.5 Authorization and Authentication
2.6 Password Basics
2.7 Network Security
2.8 Keeping Your Eyes Open
2.9 Summary
Chapter 3. Physical Security
3.1 Identifying Physical Security Vulnerabilities
3.2 Protecting Physical Assets
3.3 Holistic Security: Best Practices
3.4 Summary
Chapter 4. File System Security
4.1 Protecting Files with NTFS File Permissions
4.2 Protecting Data with the Encrypting File System
4.3 Protecting System Information with Syskey
4.4 Summary
Chapter 5. Group Policy and Security Templates
5.1 What Is Group Policy?
5.2 How Group Policy Works
5.3 How Do Security Templates Work?
5.4 Using Group Policy to Enforce Security
5.5 Using Security Templates to Deploy Secure Configurations
5.6 Summary
Chapter 6. Running Secure Code
6.1 Identifying Secure Code
6.2 Driver Signing
6.3 Software Restriction Policies
6.4 Summary
Chapter 7. Authentication
7.1 LAN Manager and NTLM
7.2 Kerberos
7.3 Summary
Chapter 8. IP Security
8.1 What Is IP Security?
8.2 How Does IPSec Work?
8.3 Microsoft s Implementation of IPSec in Windows Server 2003
8.4 Using IPSec Correctly
8.5 Summary
Chapter 9. Certificates and Public Key Infrastructure
9.1 What Are Certificates?
9.2 What Do I Do with Certificates?
9.3 What Is a Certification Authority?
9.4 Deciding Between Public and Private Certification Authorities
9.5 Implementing a Public PKI
9.6 Planning Your Private Certification Hierarchy
9.7 Implementing a Private Certification Hierarchy
9.8 Maintaining Your Hierarchy
9.9 Summary
Chapter 10. Smart Card Technology
10.1 What Are Smart Cards?
10.2 Using Smart Cards
10.3 Summary
Chapter 11. DHCP and DNS Security
11.1 DHCP
11.2 DNS
11.3 DNS and DHCP Together
11.4 Summary
Chapter 12. Internet Information Services Security
12.1 What Is IIS?
12.2 How Does IIS Work?
12.3 Using IIS Securely
12.4 Summary
Chapter 13. Active Directory Security
13.1 What Is Active Directory?
13.2 Structural Components of Active Directory
13.3 Domain Controllers
13.4 Default Security Through GPOs
13.5 Providing Security for Domains
13.6 Providing Security for Forests
13.7 Providing Security for Active Directory Objects
13.8 Providing Security for Domain Controllers
13.9 Summary
Chapter 14. Remote Access Security
14.1 What Is Remote Access?
14.2 Controlling Access
14.3 Authentication and Encryption Protocols
14.4 Virtual Private Networks
14.5 Example Implementations for Remote Access
14.6 Summary
Chapter 15. Auditing and Ongoing Security
15.1 Security Policies and Procedures
15.2 Auditing
15.3 Operating System Updates
15.4 Summary
Appendix A. Sending Secure Email
A.1 What Is Secure Email?
A.2 How Does Secure Email Work?
A.3 Considerations for Secure Email
A.4 Secure Email Implementation
A.5 Summary
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139
Authors:
Mike Danseglio
BUY ON AMAZON
WebLogic: The Definitive Guide
Transactions
Application Deployment
Using J2EE Services on the Object Tier
JMX
SNMP
Cisco CallManager Fundamentals (2nd Edition)
The Seven Fundamentals of Call Routing
Call Hunting Constructs
MGCP Gateways
Application Solutions
SCCP Call Signaling
Data Structures and Algorithms in Java
Extending a Class
Problems
Sets
Representation
B.1. Class Diagrams
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Basic Commands to Get Started
Grouping Objects into Blocks
Controlling Text in a Drawing
Dimensioning a Drawing
Managing External References
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Introduction to Probability and Statistics for Projects
Organizing and Estimating the Work
Risk-Adjusted Financial Management
Quantitative Methods in Project Contracts
User Interfaces in C#: Windows Forms and Custom Controls
Designing with Classes and Tiers
Classic Controls
Custom Controls
MDI Interfaces and Workspaces
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies