Flylib.com
Administering Windows Vista Security: The Big Surprises
Administering Windows Vista Security: The Big Surprises
ISBN: 0470108320
EAN: 2147483647
Year: 2004
Pages: 101
Authors:
Mark Minasi
,
Byron Hynes
BUY ON AMAZON
Table of Contents
Back Cover
Administering Windows Vista Security-The Big Surprises
Introduction-How to Keep Vista Security from Giving You a Stroke
Vista Turns Out to Be More Than Just a Pretty Face. Who Knew?
Meet the Coauthors
What s Inside This Book
Stay Up to Date with My Free Newsletter
Contacting Us
Chapter 1: Administering Vista Security-The Little Surprises
Power Users Are Essentially Gone
BOOT.INI Is Gone, BCD Is Here
IPv6 and Network Properties
Remote Desktop Gets a Bit More Secure
Changes in Security Options
Encryption News
New Event Viewer
Chapter 2: Understanding User Account Control (UAC)-
Why UAC Is Good, after All
An Overview of UAC
Digging Deeper into UAC
Reconfiguring User Account Control
Will UAC Succeed?
Summary
Chapter 3: Help for Those Lame Apps-File and Registry Virtualization
Seeing File Virtualization in Action
File and Registry Virtualization Considerations
Which Areas Are Protected and Where They Are Virtualized
What Does
Seeing Virtualization in Standard Versus Administrative Users
Tracking Virtualization
A Possible Virtualization Problem
Controlling Virtualization
The Future of Virtualization
Summary
Chapter 4: Understanding Windows Integrity Control
Mandatory Controls Versus Discretionary Controls
WIC Components
Seeing Processes in Action
Using WIC ACEs to Restrict Access
Things WIC ACEs Can t Do
A Note on Modifying System Files
Dialing Up Custom Labels
Summary
Chapter 5: BitLocker-Solving the Laptop Security Problem
The Laptop Security Problem Today
BitLocker Drive Encryption-the Overview
Full Disk Encryption
Authentication or Access Control
Enabling BitLocker for the First Time
Using BitLocker without a TPM
Recovery
BitLocker and Active Directory
Group Policy Options
Managing the TPM and BitLocker in the Enterprise
Servicing a BitLocker-Protected Computer
Secure Decommissioning
Planning for BitLocker Deployment
Summary
Chapter 6: Post-Boot Protection-Code Integrity, New Code Signing Rules, and PatchGuard
Giving 64-bit More Armor
Code Integrity
New Code Signing Rules
Summary
Chapter 7: How Vista Secures Services
Service Control Manager
How Vista Toughens Services: Overview
Session Separation
Reducing Service Privileges
Service Isolation
Restricting a Service s Network Ports
Summary
Index
A
B
C
D
E
F
G
H
I-J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X-Z
List of Figures
List of Tables
Page #99 (Index)
Page #100 (List of Figures)
Administering Windows Vista Security: The Big Surprises
ISBN: 0470108320
EAN: 2147483647
Year: 2004
Pages: 101
Authors:
Mark Minasi
,
Byron Hynes
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Configuring, Manipulating, and Reusing ORM Models
Conceptual Model Reports
Creating a Basic Logical Database Model
Generating a Physical Database Schema
Editing Logical Models”Intermediate Aspects
Inside Network Security Assessment: Guarding Your IT Infrastructure
Basic Security Principles
Why Risk Assessment
Reviewing Critical Systems and Information
A Brief History of Security Tools
General Security Websites
FileMaker Pro 8: The Missing Manual
Tab Panels
The Let Function and Variables
Extending Calculations
Copying Database Structure
Appendix B. FileMaker Error Codes
101 Microsoft Visual Basic .NET Applications
Working with Console Applications
Working with the .NET Framework
Building Enterprise Services Applications
Securing Applications
Windows Server 2003 for .NET Developers
Python Standard Library (Nutshell Handbooks) with
The mmap Module
The threading Module
The wave Module
The resource Module
The nt Module
Understanding Digital Signal Processing (2nd Edition)
PITFALLS IN BUILDING IIR FILTERS
REFERENCES
DECIMATION
COHERENT AVERAGING
AN EFFICIENT ARCTANGENT APPROXIMATION
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies