Flylib.com
Administering Windows Vista Security: The Big Surprises
Administering Windows Vista Security: The Big Surprises
ISBN: 0470108320
EAN: 2147483647
Year: 2004
Pages: 101
Authors:
Mark Minasi
,
Byron Hynes
BUY ON AMAZON
Table of Contents
Back Cover
Administering Windows Vista Security-The Big Surprises
Introduction-How to Keep Vista Security from Giving You a Stroke
Vista Turns Out to Be More Than Just a Pretty Face. Who Knew?
Meet the Coauthors
What s Inside This Book
Stay Up to Date with My Free Newsletter
Contacting Us
Chapter 1: Administering Vista Security-The Little Surprises
Power Users Are Essentially Gone
BOOT.INI Is Gone, BCD Is Here
IPv6 and Network Properties
Remote Desktop Gets a Bit More Secure
Changes in Security Options
Encryption News
New Event Viewer
Chapter 2: Understanding User Account Control (UAC)-
Why UAC Is Good, after All
An Overview of UAC
Digging Deeper into UAC
Reconfiguring User Account Control
Will UAC Succeed?
Summary
Chapter 3: Help for Those Lame Apps-File and Registry Virtualization
Seeing File Virtualization in Action
File and Registry Virtualization Considerations
Which Areas Are Protected and Where They Are Virtualized
What Does
Seeing Virtualization in Standard Versus Administrative Users
Tracking Virtualization
A Possible Virtualization Problem
Controlling Virtualization
The Future of Virtualization
Summary
Chapter 4: Understanding Windows Integrity Control
Mandatory Controls Versus Discretionary Controls
WIC Components
Seeing Processes in Action
Using WIC ACEs to Restrict Access
Things WIC ACEs Can t Do
A Note on Modifying System Files
Dialing Up Custom Labels
Summary
Chapter 5: BitLocker-Solving the Laptop Security Problem
The Laptop Security Problem Today
BitLocker Drive Encryption-the Overview
Full Disk Encryption
Authentication or Access Control
Enabling BitLocker for the First Time
Using BitLocker without a TPM
Recovery
BitLocker and Active Directory
Group Policy Options
Managing the TPM and BitLocker in the Enterprise
Servicing a BitLocker-Protected Computer
Secure Decommissioning
Planning for BitLocker Deployment
Summary
Chapter 6: Post-Boot Protection-Code Integrity, New Code Signing Rules, and PatchGuard
Giving 64-bit More Armor
Code Integrity
New Code Signing Rules
Summary
Chapter 7: How Vista Secures Services
Service Control Manager
How Vista Toughens Services: Overview
Session Separation
Reducing Service Privileges
Service Isolation
Restricting a Service s Network Ports
Summary
Index
A
B
C
D
E
F
G
H
I-J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X-Z
List of Figures
List of Tables
Page #99 (Index)
Page #100 (List of Figures)
Administering Windows Vista Security: The Big Surprises
ISBN: 0470108320
EAN: 2147483647
Year: 2004
Pages: 101
Authors:
Mark Minasi
,
Byron Hynes
BUY ON AMAZON
Software Configuration Management
The DoD CM Process Model
A Practical Approach to Configuration Verification and Audit
Appendix J Document Change Request (DCR)
Appendix U Acronyms and Glossary
Appendix W Physical Configuration Audit (PCA) Checklist
VBScript Programmers Reference
Data Types
Control of Flow
Script Encoding
Appendix G The Windows Script Host Object Model
Appendix K The Variant Subtypes
SQL Hacks
Hack 8. Filter Rows and Columns
Hack 9. Filter on Indexed Columns
Hack 26. Include the Rows Your JOIN Forgot
Hack 73. Mix File and Database Storage
Hack 83. Find the Top n in Each Group
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Gaining Drawing Strategies: Part 1
Gaining Drawing Strategies: Part 2
Dimensioning a Drawing
Managing External References
Appendix A Look at Drawing in 3D
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
The ROI of Lean Six Sigma for Services
Seeing Services Through Your Customers Eyes-Becoming a customer-centered organization
Executing Corporate Strategy with Lean Six Sigma
Service Process Challenges
Using DMAIC to Improve Service Processes
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Creating a Fire-Now Trigger
Creating the Quartz Database Structure
Creating the RMI Client
Configuring Quartz to Use Clustering
Using Quartz with Workflow
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies