Flylib.com
Microsoft Windows Security Resource Kit
Microsoft Windows Security Resource Kit
ISBN: 0735621748
EAN: 2147483647
Year: 2003
Pages: 189
Authors:
Ben Smith
,
Brian Komar
BUY ON AMAZON
Cover
LOC
Foreword
Acknowledgments
Introduction
Chapter 1: Key Principles of Security
Understanding Risk Management
Understanding Security
Chapter 2: Understanding Your Enemy
Knowing Yourself
Possessing Detailed Documentation of Your Network
Understanding the Level of Organizational Support You Receive
Identifying Your Attacker
What Motivates Attackers?
Why Defending Networks Is Difficult
Chapter 3: Securing User Accounts and Passwords
Securing Accounts
Granting Rights and Permissions Using Groups
Securing Passwords
Best Practices
Additional Information
Chapter 4: Securing Active Directory Objects and Attributes
Understanding the Active Directory Schema
Configuring DACLs to Secure Active Directory Objects
Securing Active Directory Objects and Attributes
Best Practices
Additional Information
Chapter 5: Implementing Group Policy
Understanding Group Policy
Processing Group Policy Objects
Altering Group Policy Application
Managing Group Policy
Best Practices
Additional Information
Chapter 6: Designing Active Directory Forests and Domains for Security
Autonomy and Isolation in Active Directory
Designing Forests for Active Directory Security
Designing Domains for Active Directory Security
Designing DNS for Active Directory Security
Designing the Delegation of Authority
Best Practices
Additional Information
Chapter 7: Securing Permissions
Securing File and Folder Permissions
Using the Encrypting File System
Securing Registry Permissions
Best Practices
Additional Information
Chapter 8: Securing Services
Managing Service Permissions
Default Services in Windows 2000 and Windows XP
Best Practices
Additional Information
Chapter 9: Implementing TCPIP Security
Securing TCPIP
Using IPSec
Best Practices
Additional Information
Chapter 10: Securing Microsoft Internet Explorer 6 and Microsoft Office XP
Security Settings in Internet Explorer 6
Security Settings in Office XP
Best Practices
Additional Information
Chapter 11: Configuring Security Templates
Using Security Template Settings
How Security Templates Work
Default Security Templates
Creating Custom Security Templates
Best Practices
Additional Information
Chapter 12: Auditing Microsoft Windows Security Events
Determining Which Events to Audit
Managing the Event Viewer
Configuring Audit Policies
Monitoring Audited Events
Best Practices
Additional Information
Chapter 13: Securing Mobile Computers
Understanding Mobile Computers
Implementing Additional Security for Laptop Computers
Securing Wireless Networking in Windows XP
Best Practices
Additional Information
Chapter 14: Implementing Security for Domain Controllers
Threats to Domain Controllers
Implementing Security on Domain Controllers
Best Practices
Additional Information
Chapter 15: Implementing Security for DNS Servers
Threats to DNS Servers
Securing DNS Servers
Best Practices
Additional Information
Chapter 16: Implementing Security for Terminal Services
Threats to Terminal Services
Securing Terminal Services
Best Practices
Additional Information
Chapter 17: Implementing Security for DHCP Servers
Threats to DHCP Servers
Securing DHCP Servers
Best Practices
Additional Information
Chapter 18: Implementing Security for WINS Servers
Threats to WINS Servers
Securing WINS Servers
Best Practices
Additional Information
Chapter 19: Implementing Security for Routing and Remote Access
Remote Access Solution Components
Threats to Remote Access Solutions
Securing Remote Access Servers
Securing Remote Access Clients
Best Practices
Additional Information
Chapter 20: Implementing Security for Certificate Services
Threats to Certificate Services
Securing Certificate Services
Best Practices
Additional Information
Chapter 21: Implementing Security for Microsoft IIS 5.0
Implementing Windows 2000 Security
Configuring IIS Security
Using Tools to Secure IIS
Configuring the FTP Service
Best Practices
Additional Information
Chapter 22: Patch Management
Types of Patches
Development of a Hotfix
Patch Management in Six Steps
Best Practices
Additional Information
Chapter 23: Using Patch Management Tools
The Security Patch Bulletin Catalog
Windows Update
Automatic Updates
Microsoft Software Update Services
Microsoft Baseline Security Analyzer
SMS Software Update Services Feature Pack
Best Practices
Additional Information
Chapter 24: Using Security Assessment Tools
Assessing Security Configuration
Performing Security Assessments
Best Practices
Additional Information
Chapter 25: Assessing the Security of a Network
Types of Security Assessments
How to Conduct Security Assessments
Conducting Penetration Tests
Best Practices
Additional Information
Chapter 26: Planning for Incident Response
Creating an Incident Response Team
Defining Incident Response Policy
Creating a Communications Plan
Best Practices
Additional Information
Chapter 27: Responding to Security Incidents
Common Indicators of Security Incidents
Analyzing a Security Incident
Conducting Security Investigations
Implementing Countermeasures to a Security Incident
Recovering Services After a Security Incident
Conducting a Security Incident Post Mortem
Best Practices
Additional Information
Chapter 28: Understanding the Importance of Privacy
Defining Privacy
The Roots of Privacy Legislation
Formulating an Enterprise Privacy Strategy
Best Practices
Additional Information
Chapter 29: Defining Privacy for the Corporate Web Site
Defining a Privacy Statement
Platform for Privacy Preferences Project
Best Practices
Additional Information
Chapter 30: Deploying Privacy in the Enterprise
Selecting Applications Based on Their Privacy Features
Protecting the Privacy of Your Employees
Protecting the Privacy of Your Customers and Business Partners
Creating a Centralized Contact System
Best Practices
Additional Information
About the Authors
Microsoft Windows Security Resource Kit
ISBN: 0735621748
EAN: 2147483647
Year: 2003
Pages: 189
Authors:
Ben Smith
,
Brian Komar
BUY ON AMAZON
Java for RPG Programmers, 2nd Edition
Arrays And Vectors
Exceptions
Threads
User Interface
More Java
The Complete Cisco VPN Configuration Guide
VPN Designs
Summary
Router ISAKMP/IKE Phase 1 Connectivity
Summary
PIX Deployment Scenarios
The Java Tutorial: A Short Course on the Basics, 4th Edition
Code Samples
Implementing Nested Classes
Creating and Using Packages
The APPLET Tag
Integrated Development Environments
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Fundamental SOA
Common misperceptions about SOA
Metadata exchange
Security
Classifying service model logic
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Conclusion
VSTO Data Programming
Publisher Certificates
VSTO Support for the WordML File Format
COM Interop and Regasm.exe
Java All-In-One Desk Reference For Dummies
Using Eclipse
Using Subclasses and Inheritance
Using the ArrayList Class
Using the LinkedList Class
Handling Events
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies