Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: Identifying and Designing for Potential Security Threats
Table 2.1: Common Network Vulnerabilities
Table 2.2: Predicted Threats Based on STRIDE Model
Table 2.3: Severity Classification Example
Chapter 3: Designing Network Infrastructure Security
Table 3.1: Common Attacks to Data Transferred across a Network
Chapter 4: Designing an Authentication Strategy for Active Directory
Table 4.1: Table 4.2 LAN Manager Compatibility Levels
Table 4.2: Windows Group Types
Chapter 5: Designing an Access Control Strategy for Network Resources
Table 5.1: Windows Access Control Model
Table 5.2: Active Directory Standard Permissions
Table 5.3: Administrative Shares
Table 5.5: Common Auditing Resources and Utilities
Table 5.4: Audit Statement Example
Chapter 6: Designing a Public Key Infrastructure with Certificate Services
Table 6.1: Available Certificate Templates
Table 6.2: Common Technologies That Rely on Certificates
Chapter 7: Designing Security for Internet Information Services
Table 7.1: List of Services Installed by Default on Windows Server 2003
Table 7.2: List of Services in the Application Server dialog box Service Description
Table 7.3: Web Service Extensions and their Common Extensions.
Chapter 8: Designing Security for Servers with Specific Roles
Table 8.1: Table 8.1 Predefined security templates
Chapter 9: Designing an Infrastructure for Updating Computers
Table 9.1: Default Administrative Templates
Table 9.2: Security Update Methods
< Day Day Up >
Previous page
Table of content
Next page
MCSE: Windows(r) Server 2003 Network Security Design Study Guide (70-298)
ISBN: 0782143296
EAN: 2147483647
Year: 2004
Pages: 168
Authors:
Brian Reisman
,
Mitch Ruebush
,
Sybex
BUY ON AMAZON
A Practitioners Guide to Software Test Design
Domain Analysis Testing
Use Case Testing
Section III - Testing Paradigms
Appendix A Brown & Donaldson Case Study
Appendix B Stateless University Registration System Case Study
Developing Tablet PC Applications (Charles River Media Programming)
Introduction to Visual Basic .NET
Working with VB .NET
Your First Program
Your First Windows Forms Application
Storing Ink in a Database
Introduction to 80x86 Assembly Language and Computer Architecture
Basic Instructions
Bit Manipulation
The Assembly Process
Floating-Point Arithmetic
Appendix B Useful MS-DOS Commands
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Exaggeration Equals Characterization
Static Matte Painting in Photoshop
Motion Titling Effects
Custom Scene Transitions
Appendix Adobe Photoshop and After Effects Resources
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Making Quantitative Decisions
Expense Accounting and Earned Value
Quantitative Time Management
Quantitative Methods in Project Contracts
MPLS Configuration on Cisco IOS Software
Cell-Mode MPLS
Case Study-Hub and Spoke MPLS VPN Network Using BGP PE-CE Routing for Sites Using Unique AS Numbers
Command Reference
Any Transport over MPLS (AToM)
Case Study 2: Implementing Multi-VRF CE, VRF Selection Using Source IP Address, VRF Selection Using Policy-Based Routing, NAT and HSRP Support in MPLS VPN, and Multicast VPN Support over Multi-VRF CE
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies