Flylib.com
Microsoft Windows Security Resource Kit
Microsoft Windows Security Resource Kit
ISBN: 0735621748
EAN: 2147483647
Year: 2003
Pages: 189
Authors:
Ben Smith
,
Brian Komar
BUY ON AMAZON
Cover
LOC
Foreword
Acknowledgments
Introduction
Chapter 1: Key Principles of Security
Understanding Risk Management
Understanding Security
Chapter 2: Understanding Your Enemy
Knowing Yourself
Possessing Detailed Documentation of Your Network
Understanding the Level of Organizational Support You Receive
Identifying Your Attacker
What Motivates Attackers?
Why Defending Networks Is Difficult
Chapter 3: Securing User Accounts and Passwords
Securing Accounts
Granting Rights and Permissions Using Groups
Securing Passwords
Best Practices
Additional Information
Chapter 4: Securing Active Directory Objects and Attributes
Understanding the Active Directory Schema
Configuring DACLs to Secure Active Directory Objects
Securing Active Directory Objects and Attributes
Best Practices
Additional Information
Chapter 5: Implementing Group Policy
Understanding Group Policy
Processing Group Policy Objects
Altering Group Policy Application
Managing Group Policy
Best Practices
Additional Information
Chapter 6: Designing Active Directory Forests and Domains for Security
Autonomy and Isolation in Active Directory
Designing Forests for Active Directory Security
Designing Domains for Active Directory Security
Designing DNS for Active Directory Security
Designing the Delegation of Authority
Best Practices
Additional Information
Chapter 7: Securing Permissions
Securing File and Folder Permissions
Using the Encrypting File System
Securing Registry Permissions
Best Practices
Additional Information
Chapter 8: Securing Services
Managing Service Permissions
Default Services in Windows 2000 and Windows XP
Best Practices
Additional Information
Chapter 9: Implementing TCPIP Security
Securing TCPIP
Using IPSec
Best Practices
Additional Information
Chapter 10: Securing Microsoft Internet Explorer 6 and Microsoft Office XP
Security Settings in Internet Explorer 6
Security Settings in Office XP
Best Practices
Additional Information
Chapter 11: Configuring Security Templates
Using Security Template Settings
How Security Templates Work
Default Security Templates
Creating Custom Security Templates
Best Practices
Additional Information
Chapter 12: Auditing Microsoft Windows Security Events
Determining Which Events to Audit
Managing the Event Viewer
Configuring Audit Policies
Monitoring Audited Events
Best Practices
Additional Information
Chapter 13: Securing Mobile Computers
Understanding Mobile Computers
Implementing Additional Security for Laptop Computers
Securing Wireless Networking in Windows XP
Best Practices
Additional Information
Chapter 14: Implementing Security for Domain Controllers
Threats to Domain Controllers
Implementing Security on Domain Controllers
Best Practices
Additional Information
Chapter 15: Implementing Security for DNS Servers
Threats to DNS Servers
Securing DNS Servers
Best Practices
Additional Information
Chapter 16: Implementing Security for Terminal Services
Threats to Terminal Services
Securing Terminal Services
Best Practices
Additional Information
Chapter 17: Implementing Security for DHCP Servers
Threats to DHCP Servers
Securing DHCP Servers
Best Practices
Additional Information
Chapter 18: Implementing Security for WINS Servers
Threats to WINS Servers
Securing WINS Servers
Best Practices
Additional Information
Chapter 19: Implementing Security for Routing and Remote Access
Remote Access Solution Components
Threats to Remote Access Solutions
Securing Remote Access Servers
Securing Remote Access Clients
Best Practices
Additional Information
Chapter 20: Implementing Security for Certificate Services
Threats to Certificate Services
Securing Certificate Services
Best Practices
Additional Information
Chapter 21: Implementing Security for Microsoft IIS 5.0
Implementing Windows 2000 Security
Configuring IIS Security
Using Tools to Secure IIS
Configuring the FTP Service
Best Practices
Additional Information
Chapter 22: Patch Management
Types of Patches
Development of a Hotfix
Patch Management in Six Steps
Best Practices
Additional Information
Chapter 23: Using Patch Management Tools
The Security Patch Bulletin Catalog
Windows Update
Automatic Updates
Microsoft Software Update Services
Microsoft Baseline Security Analyzer
SMS Software Update Services Feature Pack
Best Practices
Additional Information
Chapter 24: Using Security Assessment Tools
Assessing Security Configuration
Performing Security Assessments
Best Practices
Additional Information
Chapter 25: Assessing the Security of a Network
Types of Security Assessments
How to Conduct Security Assessments
Conducting Penetration Tests
Best Practices
Additional Information
Chapter 26: Planning for Incident Response
Creating an Incident Response Team
Defining Incident Response Policy
Creating a Communications Plan
Best Practices
Additional Information
Chapter 27: Responding to Security Incidents
Common Indicators of Security Incidents
Analyzing a Security Incident
Conducting Security Investigations
Implementing Countermeasures to a Security Incident
Recovering Services After a Security Incident
Conducting a Security Incident Post Mortem
Best Practices
Additional Information
Chapter 28: Understanding the Importance of Privacy
Defining Privacy
The Roots of Privacy Legislation
Formulating an Enterprise Privacy Strategy
Best Practices
Additional Information
Chapter 29: Defining Privacy for the Corporate Web Site
Defining a Privacy Statement
Platform for Privacy Preferences Project
Best Practices
Additional Information
Chapter 30: Deploying Privacy in the Enterprise
Selecting Applications Based on Their Privacy Features
Protecting the Privacy of Your Employees
Protecting the Privacy of Your Customers and Business Partners
Creating a Centralized Contact System
Best Practices
Additional Information
About the Authors
Microsoft Windows Security Resource Kit
ISBN: 0735621748
EAN: 2147483647
Year: 2003
Pages: 189
Authors:
Ben Smith
,
Brian Komar
BUY ON AMAZON
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Definition Language (DDL) to Create Data Tables and Other Database Objects
Understanding SQL Transactions and Transaction Logs
Retrieving and Manipulating Data Through Cursors
Writing Advanced Queries and Subqueries
Working with SQL Database Data Across the Internet
Systematic Software Testing (Artech House Computer Library)
Detailed Test Planning
Improving the Testing Process
Appendix C IEEE Templates
Appendix D Sample Master Test Plan
Appendix F Process Diagrams
The Complete Cisco VPN Configuration Guide
Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
Summary
Administrative Tasks
Summary
Summary
Java How to Program (6th Edition) (How to Program (Deitel))
Constructors in Subclasses
Summary
Overloading Generic Methods
Reading a File on a Web Server
Appendix J. (On CD) ATM Case Study Code
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
IDS and IPS Internals
Cisco Secure IDS
NFR Security
Data Correlation
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Credibility and Computers
Credibility and the World Wide Web
Captology Looking Forward
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies