List of Tables


Chapter 2: How Hackers Attack

Table 2-1: Common Windows Locations Modified by Malware

Chapter 3: Windows Infrastructure

Table 3.1: Vista Symbolic Links

Chapter 4: User Account Control

Table 4.1: Treatment of Built-In Administrator in Safe Mode

Chapter 8: Securing Internet Explorer

Table 8-1: Comparing Browser Market Share to The Number of Vulnerabilities
Table 8-2: Summary of Internet Explorer 7's Security Zone Settings
Table 8-3: Internet Explorer 7's Default Advanced Setting Values

Chapter 9: Introducing IIS 7

Table 9-1: IIS Versions and Platforms
Table 9-2: IIS Components
Table 9-3: IIS Authentication Method Summary
Table 9-4: Comparison of Authentication Methods Requiring Credentials
Table 9-5: IIS Resource Permission Summary
Table 9-6: Sampling of IIS 7 Security Modules

Chapter 10: Protecting E-mail

Table 10-1: File Types That Have or Can Be Used Maliciously

Chapter 12: Server and Domain Isolation

Table 12-1: List All Communications in a Table

Chapter 13: Wireless Security

Table 13-1: Wi-Fi Technology Comparison

Chapter 14: Using Group Policy

Table 14-1: New Security Options in Windows Vista
Table 14-2: Security Options with Modified Defaults in Windows Vista
Table 14-3: Security Options That Were Removed in Windows Vista

Chapter 15: Thinking about Security

Table 15-1: Strength of Passwords with Various Parameters

Appendix A: Building a Windows PE Boot Disk

Table A-1: Packages Included with WinPE



Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net