Flylib.com
Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163
BUY ON AMAZON
Table of Contents
Back Cover
Windows Vista Security-Securing Vista Against Malicious Attacks
Foreword
Introduction
Overview of the Book and Technology
How This Book Is Organized
Who Should Read This Book
Tools You Will Need
What s on the Web Site
Summary
Part I: Introducing Windows Vista
Chapter 1: New Security Features
Improved C Security
Address Space Layout Randomization
Data Execution Protection
Protected Processes
Windows Vista User Experience
Host-Based Security
Securing E-mail and the Internet
Securing Windows Networks
Group Policy
64-bit Only Improvements
Future Improvements
Summary
Best Practices
Chapter 2: How Hackers Attack
Where Windows Malware Hides
Why Malicious Hackers Hack
Summary
Chapter 3: Windows Infrastructure
Post-Boot Startup
Services You Need To Understand
Registry
Logon Authentication
Access Control
Summary
Part II: Host-Based Security
Chapter 4: User Account Control
Basics
The Case for Least Privilege
Admins Are Omnipotent
User Account Control Is More Than You Think
UAC and Remote Access
UAC Policy Configuration
Frequently Asked Questions About UAC
Leveraging User Account Control in Applications
Summary
Best Practices
Chapter 5: Managing Access Control
How an Access Control List Is Used
Major Access Control List Changes in Vista
Tools to Manage Access Control Lists
Registry ACLs
Summary
Best Practices
Chapter 6: Application Security
Restart Manager
ActiveX Installer Service
Antivirus
Desktop Optimization Pack
Summary
Best Practices
Chapter 7: Vista Client Protection
Malicious Software Removal Tool
Security Center
Windows Defender
Windows Live OneCare
Microsoft Forefront Client Security
Should Microsoft Be in the Anti-Malware Business?
Summary
Best Practices
Part III: Securing Internet and E-mail Access
Chapter 8: Securing Internet Explorer
New IE 7.0 Security Features
Internet Explorer Security Settings
Will Internet Explorer 7 Be Hacked A Lot?
Summary
Best Practices
Chapter 9: Introducing IIS 7
Introduction to IIS
New IIS Features
Installing IIS 7
IIS Components
IIS Protocol Listeners
Worker Processes, Application Pools, and Identities
IUSR and IIS_USRS
IIS Administration
IIS Authentication
Web Server Access Control Permissions
Defending IIS
Summary
Chapter 10: Protecting E-mail
Introducing Windows Mail
E-mail Defenses
Summary
Best Practices
Part IV: Securing Windows Networks
Chapter 11: Managing Windows Firewall
New Features
Firewall Management
Summary
Best Practices
Chapter 12: Server and Domain Isolation
Forget About the Perimeter
Network Threat Modeling
Changes in Windows Vista Affecting SDI
Summary
Best Practices
Chapter 13: Wireless Security
Wireless Threats
New Wireless Improvements in Vista
Securing Wireless Networks
Summary
Best Practices
Part V: Group Policy and Best Practices
Chapter 14: Using Group Policy
Updated Group Policy Features
New or Updated Group Policy Settings
Settings That Require Reboot or Logon
Windows Vista Security Guide
Active Directory Schema Updates
Managing Group Policy in a Mixed Environment
Rollout Strategy
Summary
Best Practices
Chapter 15: Thinking about Security
The Three-Step Approach to Security
Wetware
Summary
Best Practices
Appendix A: Building a Windows PE Boot Disk
Downloading WAIK
Building the WinPE Image
Appendix B: References
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P-Q
R
S
T
U
V
W
X-Y
Z
List of Figures
List of Tables
List of Sidebars
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163
BUY ON AMAZON
Strategies for Information Technology Governance
Integration Strategies and Tactics for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Governance in IT Outsourcing Partnerships
Governance Structures for IT in the Health Care Industry
Documenting Software Architectures: Views and Beyond
Part I. Software Architecture Viewtypes and Styles
Examples of Interface Documentation
Choosing the Views
For Further Reading
C&C Shared-Data View
Visual C# 2005 How to Program (2nd Edition)
Structured Programming Summary
Self-Review Exercises
Self-Review Exercises
string Constructors
E.2. Unicode Transformation Formats
Web Systems Design and Online Consumer Behavior
Chapter II Information Search on the Internet: A Causal Model
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XV Customer Trust in Online Commerce
Chapter XVIII Web Systems Design, Litigation, and Online Consumer Behavior
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Working with Ideas
Voice of the Customer (VOC)
Data Collection
Descriptive Statistics and Data Displays
Identifying and Verifying Causes
Special Edition Using FileMaker 8
Working with Related Data
FileMaker Extra: User Interface Heuristics
Advanced Calculation Techniques
Post-Conversion Tasks
Deploying and Extending FileMaker
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies