

ROGER A. GRIMES is a computer security professional and penetration tester with over three decades of experience.
Meer over Roger GrimesProfessional Windows Desktop and Server Hardening
Samenvatting
Today's viruses, worms, and Trojans may seem more damaging that ever, but the attacking malware and malicious hackers are using the same tricks they always have. With this book, Microsoft MVP Roger Grimes exposes the real threat to Windows computers and offers practical guidance to secure those systems.
Grimes shares proven yet unconventional defences that most Windows administers don't use. He walks you step-by-step through these techniques, clearly showing you how to secure your Windows operating system beyond the Microsoft defaults. You'll get security advice for Windows 2000, XP, and Server 2003, in addition to emerging technologies from Microsoft. Plus, the book details hundreds of group policy settings and the best way to apply group policy objects. Ultimately, you'll discover how to harden Microsoft most commonly attacked applications while automating all of your security settings.
What you will learn from this book:
- How Windows desktop and server security can be dramatically improved by configuring default security
- Ways to enhance authentication and prevent password crackers
- Techniques for stopping unauthorized application installation or execution
- Tips for defending against the biggest e-mail security threats
- How to achieve seamless and secure file encryption
- Steps to create customized security and administrative templates
- How internet Explorer functions behind the scenes and the recommended configuration
This book is for Microsoft Windows administrators who need to significantly increase the security of their clients and servers using the best methods available
Specificaties
Inhoudsopgave
Introduction.
Part 1: The Basics in Depth.
1. Windows Attacks.
2. Conventional and Unconventional Defenses.
3. NTFS Permissions 101.
Part 2: OS Hardening.
4. Preventing Password Crackers.
5. Protecting High-Risk Files.
6. Protecting High-Risk Registry Entries.
7. Tightening Services.
8. Using IPSec.
Part 3: Application Security.
9. Stopping Unauthorized Execution.
10. Securing Internet Explorer.
11. Protecting E-mail.
12. IIS Security.
13. Using Encrypting File System.
Part 4: Automating Security.
14. Group Policy Explained.
15. Designing a Secure Active Directory Infrastructure.
Book Summary.
Index.
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht