Flylib.com
Windows Server 2003 Security Infrastructures: Core Security Features (HP Technologies)
Windows Server 2003 Security Infrastructures: Core Security Features (HP Technologies)
ISBN: 1555582834
EAN: 2147483647
Year: 2003
Pages: 137
Authors:
Jan De Clercq
BUY ON AMAZON
Table of Contents
BackCover
Windows Server 2003 Security Infrastructures
Foreword
Preface
Chapter 1: The Challenge of Trusted Security Infrastructures
1.2 Positioning trusted security infrastructures
1.3 The fundamental role of trust
1.4 TSI roles
1.5 The long road toward unified TSI solutions
1.6 Microsoft and the challenge of TSIs
1.7 Conclusion
Chapter 2: Windows Security Authorities and Principals
2.2 Security principals
Chapter 3: Windows Trust Relationships
3.2 Trust properties and types
3.3 Trust relationships: Under the hood
3.4 Forest trust
3.5 Trusts and secure channels
3.6 Trusts and firewalls
Chapter 4: Introducing Windows Authentication
4.2 Qualifying authentication
4.3 Authentication authentication architecture
4.4 Authentication in the Windows machine startup and user logon sequences
4.5 NTLM-based authentication
4.6 Secondary logon service
4.7 Anonymous access
4.8 Credential caching
4.9 General authentication troubleshooting
4.10 What s coming up in the next chapters?
Chapter 5: Kerberos
5.2 Kerberos: The basic protocol
5.3 Logging on to windows using Kerberos
5.4 Advanced Kerberos topics
5.5 Kerberos configuration
5.6 Kerberos and authentication troubleshooting
5.7 Kerberos interoperability
Chapter 6: IIS Authentication
6.2 Introducing IIS authentication
6.3 HTTP authentication
6.4 Integrated Windows authentication
6.5 Passport-based authentication
6.6 Certificate-based authentication
6.7 IIS Authentication method comparison
Chapter 7: Microsoft Passport
7.2 Passport infrastructure
7.3 Basic passport authentication exchange
7.4 XP and Windows Server 2003 changes
7.5 Passport cookies
7.6 Passport authentication revisited
7.7 Passport and the privacy of user information
7.8 Passport integration in Windows Server 2003
7.9 Passport futures
Chapter 8: UNIX and Windows Authentication Interoperability
8.1 Comparing Windows and UNIX authentication
8.2 Interoperability enabling technologies
8.3 UNIX security-related concepts
8.4 Windows and UNIX account management and authentication integration approaches
8.5 Summary
Chapter 9: Single Sign-On
9.1 Single sign-on: Pros and cons
9.2 SSO architectures
9.3 Extending SSO
9.4 SSO technologies in Windows Server 2003 and XP
9.5 Summary
Chapter 10: Windows Server 2003 Authorization
10.2 The Windows authorization model
10.3 Windows 2000 authorization changes
10.4 Windows Server 2003 authorization changes
10.5 Authorization intermediaries
10.6 User rights
10.7 Administrative delegation
10.8 Authorization tools
Chapter 11: Malicious Mobile Code Protection
11.2 Software restriction policies
11.3 Code Access Security
11.4 Comparing SRPs and CAS
Chapter 12: New Authorization Tracks: Role-Based Access Control and Digital Rights Management
12.1 Role-based access control
12.2 Digital rights management
Chapter 13: Introducing Windows Server 2003 Public Key Infrastructure
13.2 A short history of Windows PKI
13.3 Why use the Microsoft PKI software?
13.4 Windows Server 2003 PKI core components
Chapter 14: Trust in Windows Server 2003 PKI
14.2 A trust taxonomy
14.3 PKI trust terminology
14.4 PKI trust models
14.5 User PKI trust management
14.6 CA trust definition
14.7 Summary
Chapter 15: The Certificate Life Cycle
15.2 Certificate enrollment
15.3 Key archival and recovery
15.4 Data recovery
15.5 Certificate validation
15.6 Certificate retrieval
15.7 Key and certificate update
15.8 Certificate revocation
15.9 Certificate expiry and certificate lifetimes
Chapter 16: Building and Maintaining a Windows PKI
16.2 Maintaining a PKI
16.3 Administration and troubleshooting tools
Chapter 17: Windows Server 2003 PKI-enabled Applications
17.2 Secure mail using SMIME
17.3 Leveraging smart cards and USB tokens for PKI-enabled applications
Chapter 18: Windows Server 2003 Security Management
18.2 Security patch management
18.3 Security-related auditing
Appendix A: The ITU-T X.509 Standard for Certificate and CRL Formats
Appendix B: PKCS Standards
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q-R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X-Z
List of Figures
List of Tables
Windows Server 2003 Security Infrastructures: Core Security Features (HP Technologies)
ISBN: 1555582834
EAN: 2147483647
Year: 2003
Pages: 137
Authors:
Jan De Clercq
BUY ON AMAZON
Documenting Software Architectures: Views and Beyond
Communicating-Processes Style
Work Assignment Style
Documentation Beyond Views
Where Architecture Documentation Ends
ECS System Overview
Java How to Program (6th Edition) (How to Program (Deitel))
Increment and Decrement Operators
(Optional) GUI and Graphics Case Study: Drawing Rectangles and Ovals
Self-Review Exercises
Wrap-up
Instructions on Setting MySQL User Account
MySQL Cookbook
Adding a Temporal Interval to a Time
Recording a Rows Creation Time
Validation by Direct Comparison
Serving Banner Ads
C.5. Java Resources
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 23. Explore David Rumseys Historical Maps
Hack 24. Explore a 3-D Model of the Entire World
Hack 30. Plot a Great Circle on a Flat Map
Hack 32. Hack on Base Maps in Your Favorite Image Editor
Hack 43. Map Earthquakes in (Nearly) Real Time
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 220 Branch-Circuit, Feeder, and Service Calculations
Article 250 Grounding and Bonding
Article 388 Surface Nonmetallic Raceways
Tables
Annex C. Conduit and Tubing Fill Tables for Conductors and Fixture Wires of the Same Size
Web Systems Design and Online Consumer Behavior
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter VII Objective and Perceived Complexity and Their Impacts on Internet Communication
Chapter VIII Personalization Systems and Their Deployment as Web Site Interface Design Decisions
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XII Web Design and E-Commerce
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies