Flylib.com
Administering Windows Vista Security: The Big Surprises
Administering Windows Vista Security: The Big Surprises
ISBN: 0470108320
EAN: 2147483647
Year: 2004
Pages: 101
Authors:
Mark Minasi
,
Byron Hynes
BUY ON AMAZON
Table of Contents
Back Cover
Administering Windows Vista Security-The Big Surprises
Introduction-How to Keep Vista Security from Giving You a Stroke
Vista Turns Out to Be More Than Just a Pretty Face. Who Knew?
Meet the Coauthors
What s Inside This Book
Stay Up to Date with My Free Newsletter
Contacting Us
Chapter 1: Administering Vista Security-The Little Surprises
Power Users Are Essentially Gone
BOOT.INI Is Gone, BCD Is Here
IPv6 and Network Properties
Remote Desktop Gets a Bit More Secure
Changes in Security Options
Encryption News
New Event Viewer
Chapter 2: Understanding User Account Control (UAC)-
Why UAC Is Good, after All
An Overview of UAC
Digging Deeper into UAC
Reconfiguring User Account Control
Will UAC Succeed?
Summary
Chapter 3: Help for Those Lame Apps-File and Registry Virtualization
Seeing File Virtualization in Action
File and Registry Virtualization Considerations
Which Areas Are Protected and Where They Are Virtualized
What Does
Seeing Virtualization in Standard Versus Administrative Users
Tracking Virtualization
A Possible Virtualization Problem
Controlling Virtualization
The Future of Virtualization
Summary
Chapter 4: Understanding Windows Integrity Control
Mandatory Controls Versus Discretionary Controls
WIC Components
Seeing Processes in Action
Using WIC ACEs to Restrict Access
Things WIC ACEs Can t Do
A Note on Modifying System Files
Dialing Up Custom Labels
Summary
Chapter 5: BitLocker-Solving the Laptop Security Problem
The Laptop Security Problem Today
BitLocker Drive Encryption-the Overview
Full Disk Encryption
Authentication or Access Control
Enabling BitLocker for the First Time
Using BitLocker without a TPM
Recovery
BitLocker and Active Directory
Group Policy Options
Managing the TPM and BitLocker in the Enterprise
Servicing a BitLocker-Protected Computer
Secure Decommissioning
Planning for BitLocker Deployment
Summary
Chapter 6: Post-Boot Protection-Code Integrity, New Code Signing Rules, and PatchGuard
Giving 64-bit More Armor
Code Integrity
New Code Signing Rules
Summary
Chapter 7: How Vista Secures Services
Service Control Manager
How Vista Toughens Services: Overview
Session Separation
Reducing Service Privileges
Service Isolation
Restricting a Service s Network Ports
Summary
Index
A
B
C
D
E
F
G
H
I-J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X-Z
List of Figures
List of Tables
Page #99 (Index)
Page #100 (List of Figures)
Administering Windows Vista Security: The Big Surprises
ISBN: 0470108320
EAN: 2147483647
Year: 2004
Pages: 101
Authors:
Mark Minasi
,
Byron Hynes
BUY ON AMAZON
Qshell for iSeries
Parameters and Variables, Defined
Using Parameters and Variables
Grep
C and C++ Development Tools
Appendix B Qshell versus DOS
Image Processing with LabVIEW and IMAQ Vision
CMOS Image Sensors
Frame Grabbing
Quantitative Analysis
Character Recognition
Image Focus Quality
Network Security Architectures
References
Vulnerability Types
FTP
Impact of Network Security on the Entire Design
High-End Resilient Edge Security Design
Systematic Software Testing (Artech House Computer Library)
Analysis and Design
The Software Tester
The Test Manager
Some Final Thoughts…
Appendix D Sample Master Test Plan
GO! with Microsoft Office 2003 Brief (2nd Edition)
Business Running Case
GO! with Help
GO! with Help
Access 2003
Objective 12. Use Calculated Fields in a Query
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Summary
Security Contexts
Initial Setup
Firewall Management Using ASDM
Application Inspection
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies