Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: Identifying and Designing for Potential Security Threats
Table 2.1: Common Network Vulnerabilities
Table 2.2: Predicted Threats Based on STRIDE Model
Table 2.3: Severity Classification Example
Chapter 3: Designing Network Infrastructure Security
Table 3.1: Common Attacks to Data Transferred across a Network
Chapter 4: Designing an Authentication Strategy for Active Directory
Table 4.1: Table 4.2 LAN Manager Compatibility Levels
Table 4.2: Windows Group Types
Chapter 5: Designing an Access Control Strategy for Network Resources
Table 5.1: Windows Access Control Model
Table 5.2: Active Directory Standard Permissions
Table 5.3: Administrative Shares
Table 5.5: Common Auditing Resources and Utilities
Table 5.4: Audit Statement Example
Chapter 6: Designing a Public Key Infrastructure with Certificate Services
Table 6.1: Available Certificate Templates
Table 6.2: Common Technologies That Rely on Certificates
Chapter 7: Designing Security for Internet Information Services
Table 7.1: List of Services Installed by Default on Windows Server 2003
Table 7.2: List of Services in the Application Server dialog box Service Description
Table 7.3: Web Service Extensions and their Common Extensions.
Chapter 8: Designing Security for Servers with Specific Roles
Table 8.1: Table 8.1 Predefined security templates
Chapter 9: Designing an Infrastructure for Updating Computers
Table 9.1: Default Administrative Templates
Table 9.2: Security Update Methods
< Day Day Up >
Previous page
Table of content
Next page
MCSE: Windows(r) Server 2003 Network Security Design Study Guide (70-298)
ISBN: 0782143296
EAN: 2147483647
Year: 2004
Pages: 168
Authors:
Brian Reisman
,
Mitch Ruebush
,
Sybex
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to a Named Instance of SQL Server or Microsoft Data Engine (MSDE)
Updating Server Data Using a Web Service
Converting a DataSet to an ADO Recordset
Populating a Windows Forms ComboBox
Saving and Loading a DataSet from XML
Metrics and Models in Software Quality Engineering (2nd Edition)
The Cleanroom Methodology
Model Assumptions
Lines of Code
Structure Metrics
Conducting Software Project Assessments
Java How to Program (6th Edition) (How to Program (Deitel))
Wrap-Up
Variable-Length Argument Lists
(Optional) Software Engineering Case Study: Starting to Program the Classes of the ATM System
Monitors and Monitor Locks
Introduction
Cisco IOS Cookbook (Cookbooks (OReilly))
Disabling Banners on a Port
Disabling RIP on an Interface
Using an Internal 56 Kbps CSU/DSU
Disabling Link Up/Down Traps per Interface
Allocating Static IP Addresses with DHCP
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Triggers
Indirect Privilege Escalation
Running Operating System Commands
Accessing the File System
GDI+ Programming with C#
The GDI+Painter Application
Transforming Text
Working with Bitmaps
Image Attributes and the ImageAttributes Class
GDI+ Best Practices and Performance Techniques
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies