Flylib.com
index_L
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]
L2TP (Layer 2 Tunneling Protocol)
laptops
chain locks and
educating users about traveling with
lost-and-found scenario at Sea-Tac airport
protecting, using multilayered approach
as risk factors 2nd
securing
Layer 2 Tunneling Protocol (L2TP)
layered security
LDAP (Lightweight Directory Access Protocol) interface
LM (LAN Manager)
configuring
disabling NTLM variants
disabling storage of password hashes
history of
LMCompatibility parameter
local file security for shared computers
Local Group Policy
Local Security Policy snap-in (MMC)
lock icon (public key cryptography)
locks
account lockout policies
controlling security vulnerabilities 2nd
for laptops 2nd 3rd
for wiring closets
logon auditing on domain controllers, configuring
logon events, auditing
logon process using smart cards
logon scripts
enrolling /installing certificates with
stored in domain controllers
Logon Workstations attribute
configuring
logs
analyzing DHCP logs
clearing when full
for IPSec-generated events, examining
providing forensic evidence of attacks
reviewing web server logs
security/system logs used in auditing
lost private keys, restoring
lost smart cards
LSDOU (local, site, domain, organizational unit)
Previous page
Table of content
Next page
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139
Authors:
Mike Danseglio
BUY ON AMAZON
CISSP Exam Cram 2
SECURITY-MANAGEMENT PRACTICES
About the Author
Assessing Exam Readiness
Fax Control
Business Continuity Plan (BCP)
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 3 Preventive Maintenance
Domain 1 Operating System Fundamentals
Domain 2 Installation, Configuration, and Upgrading
Domain 3 Diagnosing and Troubleshooting
Documenting Software Architectures: Views and Beyond
Notations for C&C Styles
Part II. Software Architecture Documentation in Practice
Building the Documentation Package
UML
Siemens Four Views
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Hardware Overview
DNS Doctoring
AAA Protocols and Services Supported by Cisco ASA
Summary
File Transfer Protocol
Web Systems Design and Online Consumer Behavior
Chapter I e-Search: A Conceptual Framework of Online Consumer Behavior
Chapter II Information Search on the Internet: A Causal Model
Chapter VIII Personalization Systems and Their Deployment as Web Site Interface Design Decisions
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
Java Concurrency in Practice
JVM Shutdown
Configuring ThreadPoolExecutor
Shared Data Models
Thinking about Performance
Using Condition Queues
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies