Flylib.com
Microsoft Windows Security Resource Kit
Microsoft Windows Security Resource Kit
ISBN: 0735621748
EAN: 2147483647
Year: 2003
Pages: 189
Authors:
Ben Smith
,
Brian Komar
BUY ON AMAZON
Cover
LOC
Foreword
Acknowledgments
Introduction
Chapter 1: Key Principles of Security
Understanding Risk Management
Understanding Security
Chapter 2: Understanding Your Enemy
Knowing Yourself
Possessing Detailed Documentation of Your Network
Understanding the Level of Organizational Support You Receive
Identifying Your Attacker
What Motivates Attackers?
Why Defending Networks Is Difficult
Chapter 3: Securing User Accounts and Passwords
Securing Accounts
Granting Rights and Permissions Using Groups
Securing Passwords
Best Practices
Additional Information
Chapter 4: Securing Active Directory Objects and Attributes
Understanding the Active Directory Schema
Configuring DACLs to Secure Active Directory Objects
Securing Active Directory Objects and Attributes
Best Practices
Additional Information
Chapter 5: Implementing Group Policy
Understanding Group Policy
Processing Group Policy Objects
Altering Group Policy Application
Managing Group Policy
Best Practices
Additional Information
Chapter 6: Designing Active Directory Forests and Domains for Security
Autonomy and Isolation in Active Directory
Designing Forests for Active Directory Security
Designing Domains for Active Directory Security
Designing DNS for Active Directory Security
Designing the Delegation of Authority
Best Practices
Additional Information
Chapter 7: Securing Permissions
Securing File and Folder Permissions
Using the Encrypting File System
Securing Registry Permissions
Best Practices
Additional Information
Chapter 8: Securing Services
Managing Service Permissions
Default Services in Windows 2000 and Windows XP
Best Practices
Additional Information
Chapter 9: Implementing TCPIP Security
Securing TCPIP
Using IPSec
Best Practices
Additional Information
Chapter 10: Securing Microsoft Internet Explorer 6 and Microsoft Office XP
Security Settings in Internet Explorer 6
Security Settings in Office XP
Best Practices
Additional Information
Chapter 11: Configuring Security Templates
Using Security Template Settings
How Security Templates Work
Default Security Templates
Creating Custom Security Templates
Best Practices
Additional Information
Chapter 12: Auditing Microsoft Windows Security Events
Determining Which Events to Audit
Managing the Event Viewer
Configuring Audit Policies
Monitoring Audited Events
Best Practices
Additional Information
Chapter 13: Securing Mobile Computers
Understanding Mobile Computers
Implementing Additional Security for Laptop Computers
Securing Wireless Networking in Windows XP
Best Practices
Additional Information
Chapter 14: Implementing Security for Domain Controllers
Threats to Domain Controllers
Implementing Security on Domain Controllers
Best Practices
Additional Information
Chapter 15: Implementing Security for DNS Servers
Threats to DNS Servers
Securing DNS Servers
Best Practices
Additional Information
Chapter 16: Implementing Security for Terminal Services
Threats to Terminal Services
Securing Terminal Services
Best Practices
Additional Information
Chapter 17: Implementing Security for DHCP Servers
Threats to DHCP Servers
Securing DHCP Servers
Best Practices
Additional Information
Chapter 18: Implementing Security for WINS Servers
Threats to WINS Servers
Securing WINS Servers
Best Practices
Additional Information
Chapter 19: Implementing Security for Routing and Remote Access
Remote Access Solution Components
Threats to Remote Access Solutions
Securing Remote Access Servers
Securing Remote Access Clients
Best Practices
Additional Information
Chapter 20: Implementing Security for Certificate Services
Threats to Certificate Services
Securing Certificate Services
Best Practices
Additional Information
Chapter 21: Implementing Security for Microsoft IIS 5.0
Implementing Windows 2000 Security
Configuring IIS Security
Using Tools to Secure IIS
Configuring the FTP Service
Best Practices
Additional Information
Chapter 22: Patch Management
Types of Patches
Development of a Hotfix
Patch Management in Six Steps
Best Practices
Additional Information
Chapter 23: Using Patch Management Tools
The Security Patch Bulletin Catalog
Windows Update
Automatic Updates
Microsoft Software Update Services
Microsoft Baseline Security Analyzer
SMS Software Update Services Feature Pack
Best Practices
Additional Information
Chapter 24: Using Security Assessment Tools
Assessing Security Configuration
Performing Security Assessments
Best Practices
Additional Information
Chapter 25: Assessing the Security of a Network
Types of Security Assessments
How to Conduct Security Assessments
Conducting Penetration Tests
Best Practices
Additional Information
Chapter 26: Planning for Incident Response
Creating an Incident Response Team
Defining Incident Response Policy
Creating a Communications Plan
Best Practices
Additional Information
Chapter 27: Responding to Security Incidents
Common Indicators of Security Incidents
Analyzing a Security Incident
Conducting Security Investigations
Implementing Countermeasures to a Security Incident
Recovering Services After a Security Incident
Conducting a Security Incident Post Mortem
Best Practices
Additional Information
Chapter 28: Understanding the Importance of Privacy
Defining Privacy
The Roots of Privacy Legislation
Formulating an Enterprise Privacy Strategy
Best Practices
Additional Information
Chapter 29: Defining Privacy for the Corporate Web Site
Defining a Privacy Statement
Platform for Privacy Preferences Project
Best Practices
Additional Information
Chapter 30: Deploying Privacy in the Enterprise
Selecting Applications Based on Their Privacy Features
Protecting the Privacy of Your Employees
Protecting the Privacy of Your Customers and Business Partners
Creating a Centralized Contact System
Best Practices
Additional Information
About the Authors
Microsoft Windows Security Resource Kit
ISBN: 0735621748
EAN: 2147483647
Year: 2003
Pages: 189
Authors:
Ben Smith
,
Brian Komar
BUY ON AMAZON
Image Processing with LabVIEW and IMAQ Vision
Introduction to IMAQ Vision Builder
Image Acquisition
Other Image Sources
Camera Interfaces and Protocols
Morphology Functions
C & Data Structures (Charles River Media Computer Engineering)
Data Types
Preprocessing
Arrays
Stacks and Queues
Problems in Linked Lists
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Organizational change
Part II - The Applications
Cultural change
IT-based process change
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Installing the Designer Client
Working with Fields
Working with Views
Project: Building a Workflow Database
Adding Value into the Future
GO! with Microsoft Office 2003 Brief (2nd Edition)
In this Chapter You Learned How to
Objective 7. Format Percents, Move Formulas, and Wrap Text
Objective 4. Create a New Table
Sort, Filter, and Query a Database
Objective 11. Use Wildcards in a Query
Special Edition Using Crystal Reports 10
Understanding the Crystal Reports Gallery
Using Report Templates
Understanding Solution Kits for Crystal Enterprise
What Is the Crystal Repository?
Troubleshooting
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies