Flylib.com
Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163
BUY ON AMAZON
Table of Contents
Back Cover
Windows Vista Security-Securing Vista Against Malicious Attacks
Foreword
Introduction
Overview of the Book and Technology
How This Book Is Organized
Who Should Read This Book
Tools You Will Need
What s on the Web Site
Summary
Part I: Introducing Windows Vista
Chapter 1: New Security Features
Improved C Security
Address Space Layout Randomization
Data Execution Protection
Protected Processes
Windows Vista User Experience
Host-Based Security
Securing E-mail and the Internet
Securing Windows Networks
Group Policy
64-bit Only Improvements
Future Improvements
Summary
Best Practices
Chapter 2: How Hackers Attack
Where Windows Malware Hides
Why Malicious Hackers Hack
Summary
Chapter 3: Windows Infrastructure
Post-Boot Startup
Services You Need To Understand
Registry
Logon Authentication
Access Control
Summary
Part II: Host-Based Security
Chapter 4: User Account Control
Basics
The Case for Least Privilege
Admins Are Omnipotent
User Account Control Is More Than You Think
UAC and Remote Access
UAC Policy Configuration
Frequently Asked Questions About UAC
Leveraging User Account Control in Applications
Summary
Best Practices
Chapter 5: Managing Access Control
How an Access Control List Is Used
Major Access Control List Changes in Vista
Tools to Manage Access Control Lists
Registry ACLs
Summary
Best Practices
Chapter 6: Application Security
Restart Manager
ActiveX Installer Service
Antivirus
Desktop Optimization Pack
Summary
Best Practices
Chapter 7: Vista Client Protection
Malicious Software Removal Tool
Security Center
Windows Defender
Windows Live OneCare
Microsoft Forefront Client Security
Should Microsoft Be in the Anti-Malware Business?
Summary
Best Practices
Part III: Securing Internet and E-mail Access
Chapter 8: Securing Internet Explorer
New IE 7.0 Security Features
Internet Explorer Security Settings
Will Internet Explorer 7 Be Hacked A Lot?
Summary
Best Practices
Chapter 9: Introducing IIS 7
Introduction to IIS
New IIS Features
Installing IIS 7
IIS Components
IIS Protocol Listeners
Worker Processes, Application Pools, and Identities
IUSR and IIS_USRS
IIS Administration
IIS Authentication
Web Server Access Control Permissions
Defending IIS
Summary
Chapter 10: Protecting E-mail
Introducing Windows Mail
E-mail Defenses
Summary
Best Practices
Part IV: Securing Windows Networks
Chapter 11: Managing Windows Firewall
New Features
Firewall Management
Summary
Best Practices
Chapter 12: Server and Domain Isolation
Forget About the Perimeter
Network Threat Modeling
Changes in Windows Vista Affecting SDI
Summary
Best Practices
Chapter 13: Wireless Security
Wireless Threats
New Wireless Improvements in Vista
Securing Wireless Networks
Summary
Best Practices
Part V: Group Policy and Best Practices
Chapter 14: Using Group Policy
Updated Group Policy Features
New or Updated Group Policy Settings
Settings That Require Reboot or Logon
Windows Vista Security Guide
Active Directory Schema Updates
Managing Group Policy in a Mixed Environment
Rollout Strategy
Summary
Best Practices
Chapter 15: Thinking about Security
The Three-Step Approach to Security
Wetware
Summary
Best Practices
Appendix A: Building a Windows PE Boot Disk
Downloading WAIK
Building the WinPE Image
Appendix B: References
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P-Q
R
S
T
U
V
W
X-Y
Z
List of Figures
List of Tables
List of Sidebars
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163
BUY ON AMAZON
Java I/O
Security Checks on I/O
Counting the Available Bytes
Subclassing InputStream
Character Sets and Unicode
UTF-16
WebLogic: The Definitive Guide
Configuring a Simple Web Cluster
Configuring JDBC Connectivity
Monitoring a WebLogic Domain
Creating an Identity Assertion Provider
Web Services
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Summary
Review Questions
Music on Hold Resources
Snort Cookbook
Detecting Malware
Countermeasures from Rules
Suppressing Rules
Installing and Configuring Swatch
Obfuscating IP Addresses
Managing Enterprise Systems with the Windows Script Host
Introduction
Shell Operations
Input/Output Streams
Application Automation
Network Administration/WMI
Introduction to 80x86 Assembly Language and Computer Architecture
Representing Data in a Computer
Branching and Looping
Floating-Point Arithmetic
Decimal Arithmetic
Appendix D 80x86 Instructions (by Mnemonic)
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies