Flylib.com
Professional Windows Desktop and Server Hardening (Programmer to Programmer)
Professional Windows Desktop and Server Hardening (Programmer to Programmer)
ISBN: 0764599909
EAN: 2147483647
Year: 2004
Pages: 122
Authors:
Roger A. Grimes
BUY ON AMAZON
Table of Contents
Back Cover
Professional Windows Desktop and Server Hardening
Introduction
Why Another Book on Windows Security?
Who Is This Book For?
What s in This Book?
Conventions
Source Code
Errata
p2p.wrox.com
Part I: The Basics in Depth
Chapter 1: Windows Attacks
Attack Classes
Types of Attacks
Where Malware Hides
Summary
Chapter 2: Conventional and Unconventional Defenses
Overall Defense Strategy
Conventional Defenses
Unconventional Defenses
Summary
Chapter 3: NTFS Permissions 101
How Windows Security Works
Share and NTFS Permissions
Current Permission Settings
Other Best Practice Recommendations
Summary
Part II: OS Hardening
Chapter 4: Preventing Password Crackers
Passwords Attacks, Tools, and Techniques
Other Types of Password Attacks
Defending Against Password Attacks
Summary
Chapter 5: Protecting High-Risk Files
What Is a High-Risk File?
High-Risk File and Program Examples
High-Risk Windows Files
File Defenses
Summary
Chapter 6: Protecting High-Risk Registry Entries
Registry Introduction
High-Risk Registry Entries
Defenses
Summary
Chapter 7: Tightening Services
Reduce Buffer Overflow Risks
Services Introduction
SC
Common Windows Services and Recommendations
Securing Services
Summary
Chapter 8: Using IPSec
Introduction to IPSec
Windows IPSec
Using IPSec Security
IPSec Attacks and Defenses
Other IPSec Links
Summary
Part III: Application Security
Chapter 9: Stopping Unauthorized Execution
Deny-by-Default Software Execution
Developing a Software Restriction Policy
Methods to Prevent Unauthorized Execution
Summary
Chapter 10: Securing Internet Explorer
Internet Explorer Attacks
Internet Explorer Defenses
Summary
Chapter 11: Protecting E-Mail
E-Mail Threats
Securing E-Mail
Summary
Chapter 12: IIS Security
IIS Basics
Permissions
Step Summary
Securing IIS
Summary
Chapter 13: Using Encrypting File System
Setting Up EFS
EFS Caveats
EFS Best Practices
Other Links
Summary
Part IV: Automating Security
Chapter 14: Group Policy Explained
Group Policy Settings
Summary
Chapter 15: Designing a Secure Active Directory Infrastructure
Parts of Active Directory Security Policies
Efficient Active Directory Security Design
Summary
Book Summary
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
List of Sidebars
Professional Windows Desktop and Server Hardening (Programmer to Programmer)
ISBN: 0764599909
EAN: 2147483647
Year: 2004
Pages: 122
Authors:
Roger A. Grimes
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Welcome to DarkBASIC
Making Programs Think Branching Statements and Subroutines
Number Crunching Mathematical and Relational Operators and Commands
Adding Sound Effects to Your Game
Appendix A Answers to the Chapter Quizzes
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP System Acquisition: A Process Model and Results From an Austrian Survey
Data Mining for Business Process Reengineering
A Hybrid Clustering Technique to Improve Patient Data Quality
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Development of Interactive Web Sites to Enhance Police/Community Relations
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Malicious Call Identification
Configuring Cisco IP Phones for Cisco VT Advantage
Using Additional Management and Monitoring Tools
Remote Management Tools
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 9. Use the Microsoft Help System
Objective 7. Locate Supporting Information
GO! with Help
Objective 1. Use AutoFill to Fill a Pattern of Column and Row Titles
Objective 5. Design a Worksheet
Microsoft WSH and VBScript Programming for the Absolute Beginner
VBScript Basics
Constants, Variables, and Arrays
Using Procedures to Organize Scripts
Combining Different Scripting Languages
Appendix C Whats on the CD-ROM?
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Multithreading
Reflection
ADO.NET
ASP.NET Web Applications
Remoting and Enterprise Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies