Flylib.com
index_L
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]
L2TP (Layer 2 Tunneling Protocol)
laptops
chain locks and
educating users about traveling with
lost-and-found scenario at Sea-Tac airport
protecting, using multilayered approach
as risk factors 2nd
securing
Layer 2 Tunneling Protocol (L2TP)
layered security
LDAP (Lightweight Directory Access Protocol) interface
LM (LAN Manager)
configuring
disabling NTLM variants
disabling storage of password hashes
history of
LMCompatibility parameter
local file security for shared computers
Local Group Policy
Local Security Policy snap-in (MMC)
lock icon (public key cryptography)
locks
account lockout policies
controlling security vulnerabilities 2nd
for laptops 2nd 3rd
for wiring closets
logon auditing on domain controllers, configuring
logon events, auditing
logon process using smart cards
logon scripts
enrolling /installing certificates with
stored in domain controllers
Logon Workstations attribute
configuring
logs
analyzing DHCP logs
clearing when full
for IPSec-generated events, examining
providing forensic evidence of attacks
reviewing web server logs
security/system logs used in auditing
lost private keys, restoring
lost smart cards
LSDOU (local, site, domain, organizational unit)
Previous page
Table of content
Next page
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139
Authors:
Mike Danseglio
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Scaling Multimode Fiber-Optic Cables
Useful Fourier Transform-Pairs
Reduced-Voltage Signaling
Ringing in a New Era
Pi-Model Operated in the LC Region
SQL Hacks
Hack 11. Convert Aggregate Subqueries to JOINs
Hack 12. Simplify Complicated Updates
Hack 24. Multiply Across a Result Set
Hack 27. Identify Overlapping Ranges
Hack 74. Compare and Synchronize Tables
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 215 Feeders
Article 338 Service-Entrance Cable Types SE and USE
Article 701 Legally Required Standby Systems
Tables 11(A) and 11(B)
Example No. D2(b) Optional Calculation for One-Family Dwelling, Air Conditioning Larger than Heating [See 220.82(A) and 220.82(C)]
File System Forensic Analysis
Summary
Metadata Category
File Name Category
Standard File Attributes
File System Metadata Files
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Value Stream Mapping and Process Flow Tools
Data Collection
Variation Analysis
Reducing Lead Time and Non-Value-Add Cost
Complexity Value Stream Mapping and Complexity Analysis
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the Authentication Process
Oracle and PL/SQL
Attacking Oracle PL/SQL Web Applications
Accessing the Network
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies