Flylib.com
Securing Windows Server 2003
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139
Authors:
Mike Danseglio
BUY ON AMAZON
Securing Windows Server 2003
Table of Contents
Copyright
Preface
What s in This Book?
Audience
About This Book
Assumptions This Book Makes
Conventions Used in This Book
Comments and Questions
Acknowledgments
Chapter 1. Introduction to Windows Server 2003 Security
1.1 What Is Security?
1.2 What Is Windows Server 2003?
1.3 Security Design in Windows Server 2003
1.4 Security Features in the Windows Server 2003 Family
1.5 Summary
Chapter 2. Basics of Computer Security
2.1 Why Computer Security Is Important
2.2 Security Enforcement Mechanisms
2.3 POLA: The Principle of Least Access
2.4 Key-Based Cryptography
2.5 Authorization and Authentication
2.6 Password Basics
2.7 Network Security
2.8 Keeping Your Eyes Open
2.9 Summary
Chapter 3. Physical Security
3.1 Identifying Physical Security Vulnerabilities
3.2 Protecting Physical Assets
3.3 Holistic Security: Best Practices
3.4 Summary
Chapter 4. File System Security
4.1 Protecting Files with NTFS File Permissions
4.2 Protecting Data with the Encrypting File System
4.3 Protecting System Information with Syskey
4.4 Summary
Chapter 5. Group Policy and Security Templates
5.1 What Is Group Policy?
5.2 How Group Policy Works
5.3 How Do Security Templates Work?
5.4 Using Group Policy to Enforce Security
5.5 Using Security Templates to Deploy Secure Configurations
5.6 Summary
Chapter 6. Running Secure Code
6.1 Identifying Secure Code
6.2 Driver Signing
6.3 Software Restriction Policies
6.4 Summary
Chapter 7. Authentication
7.1 LAN Manager and NTLM
7.2 Kerberos
7.3 Summary
Chapter 8. IP Security
8.1 What Is IP Security?
8.2 How Does IPSec Work?
8.3 Microsoft s Implementation of IPSec in Windows Server 2003
8.4 Using IPSec Correctly
8.5 Summary
Chapter 9. Certificates and Public Key Infrastructure
9.1 What Are Certificates?
9.2 What Do I Do with Certificates?
9.3 What Is a Certification Authority?
9.4 Deciding Between Public and Private Certification Authorities
9.5 Implementing a Public PKI
9.6 Planning Your Private Certification Hierarchy
9.7 Implementing a Private Certification Hierarchy
9.8 Maintaining Your Hierarchy
9.9 Summary
Chapter 10. Smart Card Technology
10.1 What Are Smart Cards?
10.2 Using Smart Cards
10.3 Summary
Chapter 11. DHCP and DNS Security
11.1 DHCP
11.2 DNS
11.3 DNS and DHCP Together
11.4 Summary
Chapter 12. Internet Information Services Security
12.1 What Is IIS?
12.2 How Does IIS Work?
12.3 Using IIS Securely
12.4 Summary
Chapter 13. Active Directory Security
13.1 What Is Active Directory?
13.2 Structural Components of Active Directory
13.3 Domain Controllers
13.4 Default Security Through GPOs
13.5 Providing Security for Domains
13.6 Providing Security for Forests
13.7 Providing Security for Active Directory Objects
13.8 Providing Security for Domain Controllers
13.9 Summary
Chapter 14. Remote Access Security
14.1 What Is Remote Access?
14.2 Controlling Access
14.3 Authentication and Encryption Protocols
14.4 Virtual Private Networks
14.5 Example Implementations for Remote Access
14.6 Summary
Chapter 15. Auditing and Ongoing Security
15.1 Security Policies and Procedures
15.2 Auditing
15.3 Operating System Updates
15.4 Summary
Appendix A. Sending Secure Email
A.1 What Is Secure Email?
A.2 How Does Secure Email Work?
A.3 Considerations for Secure Email
A.4 Secure Email Implementation
A.5 Summary
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Securing Windows Server 2003
ISBN: 0596006853
EAN: 2147483647
Year: 2006
Pages: 139
Authors:
Mike Danseglio
BUY ON AMAZON
Strategies for Information Technology Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Measuring ROI in E-Commerce Applications: Analysis to Action
Managing IT Functions
Governing Information Technology Through COBIT
Metrics and Models in Software Quality Engineering (2nd Edition)
Software Quality
Histogram
Metrics and Lessons Learned for Object-Oriented Projects
Lessons Learned from OO Projects
Conducting Software Project Assessments
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
IDS and IPS Architecture
Incident Response
Policy and Procedures
Laws, Standards, and Organizations
The Future of Intrusion Detection and Prevention
File System Forensic Analysis
Bibliography
NTFS Data Structures
Standard File Attributes
Directory Entry
UFS1 Superblock
VBScript in a Nutshell, 2nd Edition
Global Code
Error Handling and Debugging
How ASP Works
Accessing Other Object Models
Windows Script Components
Python Standard Library (Nutshell Handbooks) with
The repr Module
The socket Module
The asyncore Module
Implementation Support Modules
The util Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies