Flylib.com
Securing Windows Server 2003
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139
Authors:
Mike Danseglio
BUY ON AMAZON
Securing Windows Server 2003
Table of Contents
Copyright
Preface
What s in This Book?
Audience
About This Book
Assumptions This Book Makes
Conventions Used in This Book
Comments and Questions
Acknowledgments
Chapter 1. Introduction to Windows Server 2003 Security
1.1 What Is Security?
1.2 What Is Windows Server 2003?
1.3 Security Design in Windows Server 2003
1.4 Security Features in the Windows Server 2003 Family
1.5 Summary
Chapter 2. Basics of Computer Security
2.1 Why Computer Security Is Important
2.2 Security Enforcement Mechanisms
2.3 POLA: The Principle of Least Access
2.4 Key-Based Cryptography
2.5 Authorization and Authentication
2.6 Password Basics
2.7 Network Security
2.8 Keeping Your Eyes Open
2.9 Summary
Chapter 3. Physical Security
3.1 Identifying Physical Security Vulnerabilities
3.2 Protecting Physical Assets
3.3 Holistic Security: Best Practices
3.4 Summary
Chapter 4. File System Security
4.1 Protecting Files with NTFS File Permissions
4.2 Protecting Data with the Encrypting File System
4.3 Protecting System Information with Syskey
4.4 Summary
Chapter 5. Group Policy and Security Templates
5.1 What Is Group Policy?
5.2 How Group Policy Works
5.3 How Do Security Templates Work?
5.4 Using Group Policy to Enforce Security
5.5 Using Security Templates to Deploy Secure Configurations
5.6 Summary
Chapter 6. Running Secure Code
6.1 Identifying Secure Code
6.2 Driver Signing
6.3 Software Restriction Policies
6.4 Summary
Chapter 7. Authentication
7.1 LAN Manager and NTLM
7.2 Kerberos
7.3 Summary
Chapter 8. IP Security
8.1 What Is IP Security?
8.2 How Does IPSec Work?
8.3 Microsoft s Implementation of IPSec in Windows Server 2003
8.4 Using IPSec Correctly
8.5 Summary
Chapter 9. Certificates and Public Key Infrastructure
9.1 What Are Certificates?
9.2 What Do I Do with Certificates?
9.3 What Is a Certification Authority?
9.4 Deciding Between Public and Private Certification Authorities
9.5 Implementing a Public PKI
9.6 Planning Your Private Certification Hierarchy
9.7 Implementing a Private Certification Hierarchy
9.8 Maintaining Your Hierarchy
9.9 Summary
Chapter 10. Smart Card Technology
10.1 What Are Smart Cards?
10.2 Using Smart Cards
10.3 Summary
Chapter 11. DHCP and DNS Security
11.1 DHCP
11.2 DNS
11.3 DNS and DHCP Together
11.4 Summary
Chapter 12. Internet Information Services Security
12.1 What Is IIS?
12.2 How Does IIS Work?
12.3 Using IIS Securely
12.4 Summary
Chapter 13. Active Directory Security
13.1 What Is Active Directory?
13.2 Structural Components of Active Directory
13.3 Domain Controllers
13.4 Default Security Through GPOs
13.5 Providing Security for Domains
13.6 Providing Security for Forests
13.7 Providing Security for Active Directory Objects
13.8 Providing Security for Domain Controllers
13.9 Summary
Chapter 14. Remote Access Security
14.1 What Is Remote Access?
14.2 Controlling Access
14.3 Authentication and Encryption Protocols
14.4 Virtual Private Networks
14.5 Example Implementations for Remote Access
14.6 Summary
Chapter 15. Auditing and Ongoing Security
15.1 Security Policies and Procedures
15.2 Auditing
15.3 Operating System Updates
15.4 Summary
Appendix A. Sending Secure Email
A.1 What Is Secure Email?
A.2 How Does Secure Email Work?
A.3 Considerations for Secure Email
A.4 Secure Email Implementation
A.5 Summary
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139
Authors:
Mike Danseglio
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
ORM Constraints
Conceptual Model Reports
Creating a Basic Logical Database Model
Editing Logical Models”Advanced Aspects
Absolute Beginner[ap]s Guide to Project Management
The Project Manager
Key Risk Management Principles
Are You Sure Its a Risk?
The Importance of Project Communications
Proven Techniques
Cisco Voice Gateways and Gatekeepers
Voice Translation Rules and Profiles
MGCP Gateway Fallback
Review Questions
Configuring Directory Gatekeepers
Troubleshooting Gatekeepers
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 2. Read and Respond to E-mail
Performance Assessments
Objective 7. Create a Data Table
Objective 7. Modify the Design of a Report
Objective 3. Open a Word Document That Includes a Linked Object, and Update Links
Sap Bw: a Step By Step Guide for Bw 2.0
Creating an InfoSource for Transaction Data
Aggregates and Multi-Cubes
Creating an R/3 Source System
Performance Tuning
Appendix B. SAP Basis Overview
User Interfaces in C#: Windows Forms and Custom Controls
Designing with Classes and Tiers
Control Class Basics
Dynamic User Interface
GDI+ Basics
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies