Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bragg R. — Windows Server 2003 Security: A Technical Reference
Bragg R. — Windows Server 2003 Security: A Technical Reference



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows Server 2003 Security: A Technical Reference

Автор: Bragg R.

Аннотация:

If you're a working Windows administrator, security is your #1 challenge. Now there's a single-source reference you can rely on for authoritative, independent help with every Windows Server security feature, tool, and option: Windows Server 2003 SecurityRenowned Windows security expert Roberta Bragg has brought together information that was formerly scattered through dozens of books and hundreds of online sources. She goes beyond facts and procedures, sharing powerful insights drawn from decades in IT administration and security. You'll find expert implementation tips and realistic best practices for every Windows environment, from workgroup servers to global domain architectures. Learn how to: Reflect the core principles of information security throughout your plans and processes Establish effective authentication and passwords Restrict access to servers, application software, and data Make the most of the Encrypting File System (EFS) Use Active Directory's security features and secure Active Directory itself Develop, implement, and troubleshoot group policies Deploy a secure Public Key Infrastructure (PKI) Secure remote access using VPNs via IPSec, SSL, SMB signing, LDAP signing, and more Audit and monitor your systems, detect intrusions, and respond appropriately Maintain security and protect business continuity on an ongoing basis"Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!"James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker James@accusource.net"Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003."Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com"Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security."Bob Reinsch bob.reinsch@fosstraining.com"Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information."Richard Siddaway, MCSE rsiddaw@hotmail.com"Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security."Michael VonTungeln, MCSE, CTT mvontung@yahoo.com"I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it.Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all."Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron, CPCU, CCP, AAI, Microsoft MVP - Windows Security Information Technology Consultant harrywaldronmvp@yahoo.com"Roberta Bragg's Windows Server 2003 Security offers more than just lucid coverage of how things work, but also offers sound advice on how to make them work better."Chris Quirk; MVP Windows shell/user cquirke@mvps.org"This book is an invaluable resource for anyone concerned about the security of Windows Server 2003. Despite the amount and complexity of the material presented, Roberta delivers very readable and clear coverage on most of the security-related aspects of Microsoft's flagship operative system. Highly recommended reading!"Valery Pryamikov, Security MVP, Harper Security Consulting valery.pryamikov@harper.no"As long as you have something to do with Windows 2003, I have four words for you: 'Order your copy now.'"Bernard Cheah, Microsoft IIS MVP, Infra Architect, Intel Corp. bernard@mvps.org"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized, with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron CPCU, CCP, AAI Microsoft MVP—Windows Security Information Technology Consultant


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1176

Добавлена в каталог: 25.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
(Automated Systems Recovery) sets      2nd 3rd 4th 5th
(confidentiality, integrity, and accounting)      
(confidentiality, integrity, and auditing)      
(Discretionary Access Controls)      
(Encrypting File System)      
(File Replication System)      
(Internet Authentication Service)      
(Internet Security and Acceleration Server)      
(LAN Manager)      
(Local Security Authority Subsystem)      
(Local Security Authority)      
(Mandatory Access Controls)      
(Microsoft Management Console)      
(Public Key Cryptography)      
(Public Key Infrastructure)      
(Remote Authentication Dial-In User Service)      
(Routing and Remote Access Service)      
(Secure Sockets Layer)      
(Security Support Providers)      
(Web-based Distributing Authoring and Versioning)      
(Wireless Equivalent Privacy)      
802.11 wireless access points      2nd 3rd
802.1x      
802.1x authentication      2nd 3rd
802.1x network authentication      2nd 3rd 4th
ACCESS      
Access control      
Access Control Entities (ACEs)      [See ACEs (Access Control Entities)]
access control systems      2nd 3rd 4th 5th 6th 7th 8th
access control systems, account database      
access control systems, account database, protecting      2nd 3rd 4th 5th
access control systems, anonymous access      
access control systems, anonymous access, IPC$ service      2nd 3rd 4th
access control systems, anonymous access, security principals      2nd
access control systems, anonymous access, well-known SIDs      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
access control systems, clustering      2nd
access control systems, DACs      
access control systems, DACs, (Discretionary Access Controls)      
access control systems, Dfs (distributed file system)      
access control systems, domain controllers      
access control systems, domain controllers, accident protection      
access control systems, domain controllers, administrative access      2nd
access control systems, domain controllers, backup tapes      
access control systems, domain controllers, branch/small offices      2nd 3rd 4th 5th 6th 7th
access control systems, domain controllers, control mechanisms      
access control systems, domain controllers, data centers      2nd
access control systems, domain controllers, extranets      
access control systems, domain controllers, perimeter networks      
access control systems, domain controllers, physical barriers      2nd 3rd
access control systems, domain controllers, procedural controls      
access control systems, domain controllers, sabotag protection      
access control systems, domain controllers, secure network infrastructure      2nd
access control systems, EFS      2nd 3rd 4th 5th
access control systems, EFS, (Encrypting File Systems)      
access control systems, EFS, algorithm changing      2nd
access control systems, EFS, asymmetric (public) key encryption      2nd 3rd 4th 5th 6th 7th 8th 9th
access control systems, EFS, best practices      2nd 3rd
access control systems, EFS, certificate backups      2nd 3rd
access control systems, EFS, certificate discovery      
access control systems, EFS, certificate importation      2nd 3rd
access control systems, EFS, certificate requests      2nd 3rd 4th
access control systems, EFS, cipher command      2nd 3rd 4th 5th
access control systems, EFS, components      2nd 3rd
access control systems, EFS, copying files      2nd 3rd
access control systems, EFS, decryption      2nd 3rd
access control systems, EFS, default implementation      
access control systems, EFS, disabling      2nd 3rd
access control systems, EFS, efsadu      
access control systems, EFS, efsinfo command      
access control systems, EFS, encryption      2nd 3rd 4th 5th 6th 7th
access control systems, EFS, encryption strength      2nd
access control systems, EFS, Feclient      
access control systems, EFS, file backups      
access control systems, EFS, file decryption      2nd
access control systems, EFS, file encryption      2nd 3rd
access control systems, EFS, file recovery      2nd 3rd
access control systems, EFS, file sharing      2nd 3rd 4th 5th
access control systems, EFS, file/folder color-coding      2nd 3rd
access control systems, EFS, key archivals      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
access control systems, EFS, key backups      2nd 3rd
access control systems, EFS, key importation      2nd 3rd
access control systems, EFS, Ksecdd      
access control systems, EFS, LSA (Local Security Authority)      
access control systems, EFS, master keys      
access control systems, EFS, moving files      2nd 3rd
access control systems, EFS, NTFS driver      
access control systems, EFS, offline file operations      2nd 3rd
access control systems, EFS, password resets      2nd
access control systems, EFS, PKI policy      
access control systems, EFS, private key removal      
access control systems, EFS, recovery      2nd
access control systems, EFS, recovery agents      
access control systems, EFS, recovery plans      2nd 3rd 4th
access control systems, EFS, recovery policy      2nd 3rd 4th 5th 6th
access control systems, EFS, recovery tools      
access control systems, EFS, remote storage      2nd 3rd 4th 5th 6th
access control systems, EFS, shell      
access control systems, EFS, silent decryption      
access control systems, EFS, symmetric (single) key encryption      2nd 3rd 4th 5th 6th 7th 8th 9th
access control systems, EFS, System Restore      
access control systems, EFS, third-party certificates      
access control systems, EFS, troubleshooting      2nd
access control systems, EFS, version differences      2nd 3rd
access control systems, EFS, WebDAV redirector      
access control systems, EFS, Windows Explorer menu options      
access control systems, EFS, Winlogon      
access control systems, event log access      
access control systems, event log access, controlling      2nd 3rd
access control systems, IAS      
access control systems, IAS, (Internet Authentication Service)      
access control systems, IAS, configuring      2nd 3rd 4th 5th
access control systems, IAS, installing      2nd 3rd 4th 5th 6th
access control systems, MACs      
access control systems, MACs, (Mandatory Access Controls)      
access control systems, NTFS (NT File System)      2nd
access control systems, NTFS, default permissions      2nd 3rd 4th 5th 6th 7th
access control systems, NTFS, file descriptors      2nd
access control systems, NTFS, file/folder permissions      2nd 3rd 4th
access control systems, NTFS, permission inheritance      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
access control systems, NTFS, permission interpretation      2nd 3rd
access control systems, NTFS, timestamps      
access control systems, permissions      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
access control systems, permissions, assigning      
access control systems, permissions, combining      2nd 3rd 4th 5th
access control systems, permissions, explicit permissions      
access control systems, permissions, inherited permissions permissions      2nd 3rd 4th 5th 6th 7th 8th
access control systems, permissions, printer permissions      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
access control systems, privileges      
access control systems, recovery and fault tolerance      
access control systems, rights      
access control systems, rights, assigning      2nd
access control systems, rights, implicit rights      
access control systems, rights, lockdowns      2nd 3rd 4th 5th
access control systems, rights, logon rights      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
access control systems, rights, predefined user rights      2nd 3rd 4th
access control systems, role-based access control systems      2nd 3rd
access control systems, role-based access control systems, application roles      
access control systems, role-based access control systems, computer roles      2nd 3rd
access control systems, role-based access control systems, custom role creation      2nd
access control systems, role-based access control systems, custom roles      
access control systems, role-based access control systems, group role creation      2nd
access control systems, role-based access control systems, implementing      2nd 3rd 4th
access control systems, role-based access control systems, operating system roles      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
access control systems, RRAS      
access control systems, RRAS, configuring      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
access control systems, RRAS, demand-dial VPNs      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
access control systems, RRAS, dial-up connections      2nd 3rd 4th
access control systems, RRAS, installing      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
access control systems, RRAS, VPN connections      2nd 3rd 4th
access control systems, RRAS, VPN requirements      2nd 3rd 4th
access control systems, rule-based access control systems      2nd 3rd
access control systems, Security Options      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
access control systems, security templates      2nd
access control systems, user rights management      2nd 3rd 4th 5th 6th 7th
access control systems, WebDAV      2nd
access control systems, WebDAV, client side configuration      
access control systems, WebDAV, enabling      2nd
access control systems, WebDAV, folder creation      
access control systems, WebDAV, permissions      2nd
access control systems, WebDAV, virtual directory creation      2nd
access control systems, WebDAV, virtual directory security configuration      2nd 3rd
access control systems, Windows security architecture      2nd 3rd 4th 5th 6th 7th 8th
access control, role-based access control      2nd 3rd
access control, role-based access control, Authorization Manager      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th
access control, role-based access control, Componet Services      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
access control, role-based access control, Software Restriction Policy      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st
access management      2nd 3rd 4th
access tokens      
access, local accounts      
access, local accounts, recovering      2nd 3rd 4th 5th
access, managing      
access, managing, Active Directory      2nd 3rd 4th
accesss control systems      
accesss control systems, NTFS      
accesss control systems, NTFS, ADS (alternative data streams)      2nd 3rd 4th 5th 6th 7th 8th 9th
accident protection      
account database      
account database, protecting      
account database, protecting, Syskey      2nd 3rd 4th 5th
Account expires user account restriction      
Account is sensitive and cannot be delegated user account restriction      
Account is trusted for delegation user account restriction      
Account Lockout Duration option (Account Lockout Policy)      
Account lockout policy      2nd 3rd
Account Lockout Policy (Group Policy)      
Account Lockout Policy (Group Policy), authentication management      2nd 3rd
account lockout policy, best practices      2nd
Account Lockout policy, managing      2nd 3rd
Account Lockout Threshold option (Account Lockout Policy)      
Account Operators group      
Account Policies      
Account Policies, baseline templates      2nd
Account Policy      2nd 3rd
Account Policy (Group Policy)      
Account Policy (Group Policy), authentication management      2nd 3rd
account protection      
Accountability      
accounting      [See auditing]
Accounting folder      
accounting folder, permission inheritance      
accounting, IAS      
accounting, IAS, configuring for      2nd 3rd 4th 5th 6th 7th
accounting, RRAS      
accounting, RRAS, configuring for      2nd 3rd 4th 5th 6th 7th
accounts      
accounts, access control systems      2nd 3rd 4th 5th
accounts, access control systems, Security Options      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
accounts, account database      
accounts, account database, protecting      2nd 3rd 4th 5th
accounts, Active Directory      
accounts, Active Directory, computer accounts      2nd 3rd 4th 5th 6th 7th
accounts, Active Directory, configuring      2nd 3rd 4th 5th 6th
accounts, Active Directory, creating      2nd 3rd 4th 5th 6th 7th
accounts, adding      2nd 3rd 4th
accounts, administrative accounts      
accounts, administrative accounts, protecting      
accounts, anonymous access      
accounts, anonymous access, IPC$ service      2nd 3rd 4th
accounts, anonymous access, security principals      2nd
accounts, anonymous access, well-known SIDs      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
accounts, computer accounts      
accounts, computer accounts, authentication      2nd 3rd 4th 5th 6th
accounts, computer accounts, creating      
accounts, computer accounts, pre-staged accounts      
accounts, creating      
accounts, creating, dcpromo command      
accounts, default accounts      2nd
accounts, groups      
accounts, groups, role-based access control      2nd 3rd 4th 5th 6th 7th 8th
accounts, local accounts      
accounts, local accounts, access recovery      2nd 3rd 4th 5th
accounts, passwords      
accounts, passwords, creating      2nd
accounts, permissions      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
accounts, permissions, assigning      
accounts, permissions, combining      2nd 3rd 4th 5th
accounts, permissions, explicit permissions      
accounts, permissions, inherited permissions      2nd 3rd 4th 5th 6th 7th 8th
accounts, permissions, printer permissions      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
accounts, reanimating      2nd
accounts, remote access      
accounts, remote access, configuring for      2nd 3rd 4th 5th 6th 7th
accounts, remote access, policies      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
accounts, removing      
accounts, restrictions      
accounts, restrictions, setting      2nd 3rd 4th
accounts, rights      
accounts, rights, assigning      2nd
accounts, rights, implicit rights      
accounts, rights, lockdowns      2nd 3rd 4th 5th
accounts, rights, logon rights      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
accounts, rights, predefined user rights      2nd 3rd 4th
accounts, role-based access control systems      2nd 3rd
accounts, role-based access control systems, application roles      
accounts, role-based access control systems, computer roles      2nd 3rd
accounts, role-based access control systems, custom role creation      2nd
accounts, role-based access control systems, custom roles      
accounts, role-based access control systems, group role creation      2nd
accounts, role-based access control systems, implementing      2nd 3rd 4th
accounts, role-based access control systems, operating system roles      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
accounts, rule-based access control systems      2nd 3rd
accounts, Security Principals      
accounts, system user accounts      
accounts, well-known accounts      
accounts, well-known accounts, protecting      2nd
accounts, Windows security architecture      
Aces      
ACEs (Access Control Entities)      
ACEs, ACLs      
ACEs, ACLs, compared      
ACLs      2nd 3rd
ACLs (access control lists)      
ACLs, ACEs      
ACLs, ACEs, compared      
ACLs, Active Directory      
ACLs, Active Directory, extended rights      2nd
ACLs, Active Directory, rights      
ACLs, copying      
ACLs, copying, xcopy command      
action      
Active Directory      2nd 3rd 4th 5th 6th 7th
Active Directory connectivity      
Active Directory replication      
Active Directory trees      
Active Directory, access      
Active Directory, access, managing      2nd 3rd 4th
Active Directory, accounts      
Active Directory, accounts, configuring      2nd 3rd 4th 5th 6th
Active Directory, accounts, creating      2nd 3rd 4th 5th 6th 7th
Active Directory, ACLs (Access Control Lists)      
Active Directory, ACLs, extended rights      2nd
Active Directory, ACLs, rights      
Active Directory, administration      
Active Directory, administration, delegation      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Active Directory, administrative authority      
Active Directory, administrative authority, delegation      
Active Directory, autonomy      
Active Directory, backups      2nd 3rd
Active Directory, Built-in contatiner      
Active Directory, Built-in contatiner, groups      
1 2 3 4 5 6 7 8 9
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2020
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте