Flylib.com
Securing Windows Server 2003
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139
Authors:
Mike Danseglio
BUY ON AMAZON
Securing Windows Server 2003
Table of Contents
Copyright
Preface
What s in This Book?
Audience
About This Book
Assumptions This Book Makes
Conventions Used in This Book
Comments and Questions
Acknowledgments
Chapter 1. Introduction to Windows Server 2003 Security
1.1 What Is Security?
1.2 What Is Windows Server 2003?
1.3 Security Design in Windows Server 2003
1.4 Security Features in the Windows Server 2003 Family
1.5 Summary
Chapter 2. Basics of Computer Security
2.1 Why Computer Security Is Important
2.2 Security Enforcement Mechanisms
2.3 POLA: The Principle of Least Access
2.4 Key-Based Cryptography
2.5 Authorization and Authentication
2.6 Password Basics
2.7 Network Security
2.8 Keeping Your Eyes Open
2.9 Summary
Chapter 3. Physical Security
3.1 Identifying Physical Security Vulnerabilities
3.2 Protecting Physical Assets
3.3 Holistic Security: Best Practices
3.4 Summary
Chapter 4. File System Security
4.1 Protecting Files with NTFS File Permissions
4.2 Protecting Data with the Encrypting File System
4.3 Protecting System Information with Syskey
4.4 Summary
Chapter 5. Group Policy and Security Templates
5.1 What Is Group Policy?
5.2 How Group Policy Works
5.3 How Do Security Templates Work?
5.4 Using Group Policy to Enforce Security
5.5 Using Security Templates to Deploy Secure Configurations
5.6 Summary
Chapter 6. Running Secure Code
6.1 Identifying Secure Code
6.2 Driver Signing
6.3 Software Restriction Policies
6.4 Summary
Chapter 7. Authentication
7.1 LAN Manager and NTLM
7.2 Kerberos
7.3 Summary
Chapter 8. IP Security
8.1 What Is IP Security?
8.2 How Does IPSec Work?
8.3 Microsoft s Implementation of IPSec in Windows Server 2003
8.4 Using IPSec Correctly
8.5 Summary
Chapter 9. Certificates and Public Key Infrastructure
9.1 What Are Certificates?
9.2 What Do I Do with Certificates?
9.3 What Is a Certification Authority?
9.4 Deciding Between Public and Private Certification Authorities
9.5 Implementing a Public PKI
9.6 Planning Your Private Certification Hierarchy
9.7 Implementing a Private Certification Hierarchy
9.8 Maintaining Your Hierarchy
9.9 Summary
Chapter 10. Smart Card Technology
10.1 What Are Smart Cards?
10.2 Using Smart Cards
10.3 Summary
Chapter 11. DHCP and DNS Security
11.1 DHCP
11.2 DNS
11.3 DNS and DHCP Together
11.4 Summary
Chapter 12. Internet Information Services Security
12.1 What Is IIS?
12.2 How Does IIS Work?
12.3 Using IIS Securely
12.4 Summary
Chapter 13. Active Directory Security
13.1 What Is Active Directory?
13.2 Structural Components of Active Directory
13.3 Domain Controllers
13.4 Default Security Through GPOs
13.5 Providing Security for Domains
13.6 Providing Security for Forests
13.7 Providing Security for Active Directory Objects
13.8 Providing Security for Domain Controllers
13.9 Summary
Chapter 14. Remote Access Security
14.1 What Is Remote Access?
14.2 Controlling Access
14.3 Authentication and Encryption Protocols
14.4 Virtual Private Networks
14.5 Example Implementations for Remote Access
14.6 Summary
Chapter 15. Auditing and Ongoing Security
15.1 Security Policies and Procedures
15.2 Auditing
15.3 Operating System Updates
15.4 Summary
Appendix A. Sending Secure Email
A.1 What Is Secure Email?
A.2 How Does Secure Email Work?
A.3 Considerations for Secure Email
A.4 Secure Email Implementation
A.5 Summary
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139
Authors:
Mike Danseglio
BUY ON AMAZON
SQL Tips & Techniques (Miscellaneous)
Understanding SQL Basics and Creating Database Files
Understanding SQL Transactions and Transaction Logs
Performing Multiple-table Queries and Creating SQL Data Views
Working with SQL JOIN Statements and Other Multiple-table Queries
Working with Stored Procedures
FileMaker Pro 8: The Missing Manual
Sorting Records
Plug-ins
Other Script Steps
Organizing Complex Scripts
Appendix B. FileMaker Error Codes
Competency-Based Human Resource Management
A Need for Implementing Competency-Based HR Management
Competency-Based Employee Training
Competency-Based HR Management The Next Steps
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix B Further Suggestions on Employee Development
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
What this book does not cover
Fundamental SOA
Web Services and Primitive SOA
Part II: SOA and WS-* Extensions
WS-Policy language basics
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 4. Connect Linux with a Bluetooth Phone
Hack 36. Estimate Network Performance
Hack 49. Poll Wireless Clients
Hack 60. Backlight Your Zipit
Section A.2. 802.11a: The Betamax of the 802.11 Family
Programming .Net Windows Applications
Getting Started
The Drawing Namespace
TreeView and ListView
Creating a User Control
Creating Custom Controls from Scratch
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies