Flylib.com
Administering Windows Vista Security: The Big Surprises
Administering Windows Vista Security: The Big Surprises
ISBN: 0470108320
EAN: 2147483647
Year: 2004
Pages: 101
Authors:
Mark Minasi
,
Byron Hynes
BUY ON AMAZON
Table of Contents
Back Cover
Administering Windows Vista Security-The Big Surprises
Introduction-How to Keep Vista Security from Giving You a Stroke
Vista Turns Out to Be More Than Just a Pretty Face. Who Knew?
Meet the Coauthors
What s Inside This Book
Stay Up to Date with My Free Newsletter
Contacting Us
Chapter 1: Administering Vista Security-The Little Surprises
Power Users Are Essentially Gone
BOOT.INI Is Gone, BCD Is Here
IPv6 and Network Properties
Remote Desktop Gets a Bit More Secure
Changes in Security Options
Encryption News
New Event Viewer
Chapter 2: Understanding User Account Control (UAC)-
Why UAC Is Good, after All
An Overview of UAC
Digging Deeper into UAC
Reconfiguring User Account Control
Will UAC Succeed?
Summary
Chapter 3: Help for Those Lame Apps-File and Registry Virtualization
Seeing File Virtualization in Action
File and Registry Virtualization Considerations
Which Areas Are Protected and Where They Are Virtualized
What Does
Seeing Virtualization in Standard Versus Administrative Users
Tracking Virtualization
A Possible Virtualization Problem
Controlling Virtualization
The Future of Virtualization
Summary
Chapter 4: Understanding Windows Integrity Control
Mandatory Controls Versus Discretionary Controls
WIC Components
Seeing Processes in Action
Using WIC ACEs to Restrict Access
Things WIC ACEs Can t Do
A Note on Modifying System Files
Dialing Up Custom Labels
Summary
Chapter 5: BitLocker-Solving the Laptop Security Problem
The Laptop Security Problem Today
BitLocker Drive Encryption-the Overview
Full Disk Encryption
Authentication or Access Control
Enabling BitLocker for the First Time
Using BitLocker without a TPM
Recovery
BitLocker and Active Directory
Group Policy Options
Managing the TPM and BitLocker in the Enterprise
Servicing a BitLocker-Protected Computer
Secure Decommissioning
Planning for BitLocker Deployment
Summary
Chapter 6: Post-Boot Protection-Code Integrity, New Code Signing Rules, and PatchGuard
Giving 64-bit More Armor
Code Integrity
New Code Signing Rules
Summary
Chapter 7: How Vista Secures Services
Service Control Manager
How Vista Toughens Services: Overview
Session Separation
Reducing Service Privileges
Service Isolation
Restricting a Service s Network Ports
Summary
Index
A
B
C
D
E
F
G
H
I-J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X-Z
List of Figures
List of Tables
Page #99 (Index)
Page #100 (List of Figures)
Administering Windows Vista Security: The Big Surprises
ISBN: 0470108320
EAN: 2147483647
Year: 2004
Pages: 101
Authors:
Mark Minasi
,
Byron Hynes
BUY ON AMAZON
Adobe After Effects 7.0 Studio Techniques
Animation Methods
Motion Blur
Beyond the Basics
Morphing
Sci-Fi Weaponry
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Basic ImageReady Animation, Tweening, and Layer Styles
Cause and Effect
Motion Matte Painting in Photoshop
Color, Light, and Focus
Appendix Adobe Photoshop and After Effects Resources
InDesign Type: Professional Typography with Adobe InDesign CS2
Optical Margin Alignment
Space Before and Space After
Numbered Lists
Working with Rows and Columns
Creating Default Styles
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
The PSTN Infrastructure
The Broadband Infrastructure
Wireless Impairments
1G: Analog Transmission
Mobile Video
FileMaker 8 Functions and Scripts Desk Reference
Day()
Exact()
Get(ActiveSelectionSize)
Get(FoundCount)
WordCount()
Java All-In-One Desk Reference For Dummies
Book III - Object-Oriented Programming
Using Abstract Classes and Interfaces
Using Inner Classes
Using Arrays
Creating Generic Collection Classes
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies