Flylib.com
Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163
BUY ON AMAZON
Table of Contents
Back Cover
Windows Vista Security-Securing Vista Against Malicious Attacks
Foreword
Introduction
Overview of the Book and Technology
How This Book Is Organized
Who Should Read This Book
Tools You Will Need
What s on the Web Site
Summary
Part I: Introducing Windows Vista
Chapter 1: New Security Features
Improved C Security
Address Space Layout Randomization
Data Execution Protection
Protected Processes
Windows Vista User Experience
Host-Based Security
Securing E-mail and the Internet
Securing Windows Networks
Group Policy
64-bit Only Improvements
Future Improvements
Summary
Best Practices
Chapter 2: How Hackers Attack
Where Windows Malware Hides
Why Malicious Hackers Hack
Summary
Chapter 3: Windows Infrastructure
Post-Boot Startup
Services You Need To Understand
Registry
Logon Authentication
Access Control
Summary
Part II: Host-Based Security
Chapter 4: User Account Control
Basics
The Case for Least Privilege
Admins Are Omnipotent
User Account Control Is More Than You Think
UAC and Remote Access
UAC Policy Configuration
Frequently Asked Questions About UAC
Leveraging User Account Control in Applications
Summary
Best Practices
Chapter 5: Managing Access Control
How an Access Control List Is Used
Major Access Control List Changes in Vista
Tools to Manage Access Control Lists
Registry ACLs
Summary
Best Practices
Chapter 6: Application Security
Restart Manager
ActiveX Installer Service
Antivirus
Desktop Optimization Pack
Summary
Best Practices
Chapter 7: Vista Client Protection
Malicious Software Removal Tool
Security Center
Windows Defender
Windows Live OneCare
Microsoft Forefront Client Security
Should Microsoft Be in the Anti-Malware Business?
Summary
Best Practices
Part III: Securing Internet and E-mail Access
Chapter 8: Securing Internet Explorer
New IE 7.0 Security Features
Internet Explorer Security Settings
Will Internet Explorer 7 Be Hacked A Lot?
Summary
Best Practices
Chapter 9: Introducing IIS 7
Introduction to IIS
New IIS Features
Installing IIS 7
IIS Components
IIS Protocol Listeners
Worker Processes, Application Pools, and Identities
IUSR and IIS_USRS
IIS Administration
IIS Authentication
Web Server Access Control Permissions
Defending IIS
Summary
Chapter 10: Protecting E-mail
Introducing Windows Mail
E-mail Defenses
Summary
Best Practices
Part IV: Securing Windows Networks
Chapter 11: Managing Windows Firewall
New Features
Firewall Management
Summary
Best Practices
Chapter 12: Server and Domain Isolation
Forget About the Perimeter
Network Threat Modeling
Changes in Windows Vista Affecting SDI
Summary
Best Practices
Chapter 13: Wireless Security
Wireless Threats
New Wireless Improvements in Vista
Securing Wireless Networks
Summary
Best Practices
Part V: Group Policy and Best Practices
Chapter 14: Using Group Policy
Updated Group Policy Features
New or Updated Group Policy Settings
Settings That Require Reboot or Logon
Windows Vista Security Guide
Active Directory Schema Updates
Managing Group Policy in a Mixed Environment
Rollout Strategy
Summary
Best Practices
Chapter 15: Thinking about Security
The Three-Step Approach to Security
Wetware
Summary
Best Practices
Appendix A: Building a Windows PE Boot Disk
Downloading WAIK
Building the WinPE Image
Appendix B: References
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P-Q
R
S
T
U
V
W
X-Y
Z
List of Figures
List of Tables
List of Sidebars
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Risk-Assessment Methodologies
A Brief History of Security Tools
Preparing the Final Report
Roles, Responsibilities, and Accountabilities
SIRT Incident Report
A Practitioners Guide to Software Test Design
The Testing Process
Boundary Value Testing
Decision Table Testing
When to Stop Testing
Appendix A Brown & Donaldson Case Study
Java How to Program (6th Edition) (How to Program (Deitel))
while Repetition Statement
Introduction
Mouse Event Handling
Object Serialization
Exercises
101 Microsoft Visual Basic .NET Applications
Building Windows Forms User Interfaces
Building Web Applications
Working with Console Applications
Working with the .NET Framework
Advanced .NET Framework
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
Built-in Application Services
Building AJAX Applications with ASP.NET
Web Systems Design and Online Consumer Behavior
Chapter V Consumer Complaint Behavior in the Online Environment
Chapter VII Objective and Perceived Complexity and Their Impacts on Internet Communication
Chapter IX Extrinsic Plus Intrinsic Human Factors Influencing the Web Usage
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XVII Internet Markets and E-Loyalty
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies