Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bragg R. — Windows Server 2003 Security: A Technical Reference
Bragg R. — Windows Server 2003 Security: A Technical Reference



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows Server 2003 Security: A Technical Reference

Автор: Bragg R.

Аннотация:

If you're a working Windows administrator, security is your #1 challenge. Now there's a single-source reference you can rely on for authoritative, independent help with every Windows Server security feature, tool, and option: Windows Server 2003 SecurityRenowned Windows security expert Roberta Bragg has brought together information that was formerly scattered through dozens of books and hundreds of online sources. She goes beyond facts and procedures, sharing powerful insights drawn from decades in IT administration and security. You'll find expert implementation tips and realistic best practices for every Windows environment, from workgroup servers to global domain architectures. Learn how to: Reflect the core principles of information security throughout your plans and processes Establish effective authentication and passwords Restrict access to servers, application software, and data Make the most of the Encrypting File System (EFS) Use Active Directory's security features and secure Active Directory itself Develop, implement, and troubleshoot group policies Deploy a secure Public Key Infrastructure (PKI) Secure remote access using VPNs via IPSec, SSL, SMB signing, LDAP signing, and more Audit and monitor your systems, detect intrusions, and respond appropriately Maintain security and protect business continuity on an ongoing basis"Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!"James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker James@accusource.net"Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003."Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com"Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security."Bob Reinsch bob.reinsch@fosstraining.com"Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information."Richard Siddaway, MCSE rsiddaw@hotmail.com"Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security."Michael VonTungeln, MCSE, CTT mvontung@yahoo.com"I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it.Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all."Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron, CPCU, CCP, AAI, Microsoft MVP - Windows Security Information Technology Consultant harrywaldronmvp@yahoo.com"Roberta Bragg's Windows Server 2003 Security offers more than just lucid coverage of how things work, but also offers sound advice on how to make them work better."Chris Quirk; MVP Windows shell/user cquirke@mvps.org"This book is an invaluable resource for anyone concerned about the security of Windows Server 2003. Despite the amount and complexity of the material presented, Roberta delivers very readable and clear coverage on most of the security-related aspects of Microsoft's flagship operative system. Highly recommended reading!"Valery Pryamikov, Security MVP, Harper Security Consulting valery.pryamikov@harper.no"As long as you have something to do with Windows 2003, I have four words for you: 'Order your copy now.'"Bernard Cheah, Microsoft IIS MVP, Infra Architect, Intel Corp. bernard@mvps.org"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized, with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron CPCU, CCP, AAI Microsoft MVP—Windows Security Information Technology Consultant


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1176

Добавлена в каталог: 25.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Active Directory, child objects      
Active Directory, child objects, removing      2nd 3rd 4th 5th 6th
Active Directory, computer accounts      
Active Directory, computer accounts, creating      2nd 3rd
Active Directory, computer accounts, managing      2nd 3rd 4th
Active Directory, computer containers      
Active Directory, computers      
Active Directory, computers, managing      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
Active Directory, dcpromo command      2nd 3rd 4th 5th 6th 7th
Active Directory, delegation      
Active Directory, delegation, rights      2nd
Active Directory, DNS      
Active Directory, DNS, SRV (Service locator) records      2nd
Active Directory, domain controllers      
Active Directory, Domain Controllers container      
Active Directory, domain controllers, accident protection      
Active Directory, domain controllers, administrative access      2nd
Active Directory, domain controllers, backup tapes      
Active Directory, domain controllers, baseline configuration      2nd
Active Directory, domain controllers, branch/small offices      2nd 3rd 4th 5th 6th 7th
Active Directory, domain controllers, control mechanisms      
Active Directory, domain controllers, data centers      2nd
Active Directory, domain controllers, deploying      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
Active Directory, domain controllers, event log settings      2nd 3rd
Active Directory, domain controllers, extranets      
Active Directory, domain controllers, perimeter networks      
Active Directory, domain controllers, physically securing      2nd 3rd 4th 5th 6th 7th
Active Directory, domain controllers, procedural controls      
Active Directory, domain controllers, sabotage protection      
Active Directory, domain controllers, secure network infrastructure      2nd
Active Directory, domain controllers, security configuration      
Active Directory, domain controllers, Security Template/Domain Policy configuration      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
Active Directory, domain controllers, security templates      2nd 3rd 4th 5th
Active Directory, domain controllers, system services      2nd 3rd
Active Directory, domains      
Active Directory, domains, OUs (Organizational Units)      
Active Directory, forest      2nd
Active Directory, forest-wide permissions      
Active Directory, FSMOs (Five Flexible Single Master Operations)      
Active Directory, GPOs      
Active Directory, GPOs, creating      2nd 3rd
Active Directory, GPOs, default GPOs      2nd 3rd 4th
Active Directory, GPOs, editing      
Active Directory, GPOs, inheritance control      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
Active Directory, GPOs, linking      
Active Directory, Group Policy      
Active Directory, Group Policy, administrative templates      
Active Directory, Group Policy, best practices      2nd
Active Directory, Group Policy, configuration      2nd 3rd 4th 5th 6th 7th 8th 9th
Active Directory, Group Policy, GPE (Group Policy Editor)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th
Active Directory, Group Policy, GPMC (Group Policy Management Console)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
Active Directory, Group Policy, GPMC (Group Policy Management Console);backup copying      2nd
Active Directory, Group Policy, GPMC (Group Policy Management Console);backup importation      
Active Directory, Group Policy, GPMC (Group Policy Management Console);backup management      
Active Directory, Group Policy, GPMC (Group Policy Management Console);Domain Controller Emulator (DC)      2nd 3rd 4th 5th
Active Directory, Group Policy, GPMC (Group Policy Management Console);GPO creation      
Active Directory, Group Policy, GPMC (Group Policy Management Console);GPO reporting      2nd 3rd 4th 5th
Active Directory, Group Policy, GPMC (Group Policy Management Console);GPO scoping      2nd
Active Directory, Group Policy, GPMC (Group Policy Management Console);installing      2nd
Active Directory, Group Policy, GPMC (Group Policy Management Console);opening      
Active Directory, Group Policy, GPMC (Group Policy Management Console);options      
Active Directory, Group Policy, GPMC (Group Policy Management Console);permission backups      2nd
Active Directory, Group Policy, GPMC (Group Policy Management Console);permission consistency      
Active Directory, Group Policy, GPMC (Group Policy Management Console);permission restores      2nd 3rd 4th 5th
Active Directory, Group Policy, GPMC (Group Policy Management Console);rapid adoption      
Active Directory, Group Policy, GPO (Group Policy Object)      2nd 3rd 4th 5th 6th 7th 8th 9th
Active Directory, Group Policy, IPSec policies      
Active Directory, Group Policy, public key policies      
Active Directory, Group Policy, replication latency      
Active Directory, Group Policy, restricted groups      
Active Directory, Group Policy, RSoP (Resultant Set of Policy)      2nd 3rd 4th 5th 6th 7th
Active Directory, Group Policy, Security Options      
Active Directory, Group Policy, software restriction policies      
Active Directory, Group Policy, system services      
Active Directory, Group Policy, wireless network policies      
Active Directory, Group Policy, WMI (Windows Management Instrumentation) filters      2nd 3rd
Active Directory, groups      
Active Directory, groups, access management      2nd 3rd 4th
Active Directory, groups, creating      2nd 3rd
Active Directory, groups, rights management      2nd 3rd 4th
Active Directory, hierarchical structure      2nd 3rd 4th 5th 6th
Active Directory, isolation      
Active Directory, NTLM (NT LAN Manager)      
Active Directory, NTLM (NT LAN Manager), configuration      
Active Directory, objects      
Active Directory, objects, auditing      2nd 3rd 4th 5th 6th 7th 8th
Active Directory, objects, permissions      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
Active Directory, outdated backups      
Active Directory, outdated backups, object deletion      
Active Directory, permissions      
Active Directory, permissions, generic permissions      
Active Directory, permissions, granular permissions      
Active Directory, permissions, property-specific permissions      2nd 3rd
Active Directory, replication      2nd
Active Directory, replication, Global Catalog replication      
Active Directory, replication, multi-master replication      
Active Directory, replication, troubleshooting      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd
Active Directory, restores      2nd
Active Directory, restores, authoritative restores      2nd 3rd 4th 5th 6th 7th
Active Directory, restores, normal restores      
Active Directory, restores, offline administrator account passwords      2nd
Active Directory, rights      
Active Directory, rights, managing      2nd 3rd 4th
Active Directory, security monitoring      2nd 3rd
Active Directory, security monitoring, dcdiag      2nd 3rd 4th
Active Directory, security monitoring, Group Policy      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
Active Directory, security monitoring, replication      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th
Active Directory, security policy boundaries      2nd
Active Directory, sites      2nd
Active Directory, SOMs (Scope of Management)      
Active Directory, Trusted for delegation option      2nd 3rd
Active Directory, user accounts      
Active Directory, user accounts, creating      
Active Directory, User containers      
Active Directory, users      
Active Directory, Users container      
Active Directory, Users container, groups      
Active Directory, users, configuring      2nd 3rd 4th 5th 6th
Active Directory, users, creating      2nd 3rd 4th 5th 6th 7th
Active Directory, users, managing      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
adding      
adding to      
Additional Rules Folder      
Additional Rules Folder, automatic path rules      
Adm subfolder (GPO)      
ADMIN$ share      
administartion      
administartion, roles      
administartion, roles, best practices      2nd 3rd
Administration      
administration practices      
administration roles      
administration, Active Directory      
administration, Active Directory, delegation      
administration, Authorization Manager      2nd
administration, delegation      
administration, delegation, Active Directory      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
administration, secure configuration      
administration, secure configuration, personnel issues      
administration, secure configuration, roles      2nd 3rd 4th 5th
administration, secure configuration, service and data administrators      2nd 3rd
administrative access      2nd
administrative authority      
administrative practices      2nd
administrative practices, account protection      
administrative practices, power limitations      2nd 3rd
administrative practices, process protection      
administrative practices, Remote Assistance      
administrative practices, Remote Assistance, configuring      2nd 3rd
administrative practices, Remote Assistance, hardening      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
administrative practices, Remote Assistance, offering      2nd 3rd 4th
administrative practices, Remote Assistance, preventing      2nd
administrative practices, Remote Assistance, requesting      2nd 3rd 4th 5th 6th
administrative practices, Remote Desktop Connection for Windows Server 2003      
administrative practices, Remote Desktop Connection for Windows Server 2003, hardening      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
administrative rights      
administrative roles      
administrative templates      
administrative templates, Group Policy      
Administrators group      
ADS (alternative data streams)      2nd 3rd
ADS (alternative data streams), creating      2nd 3rd 4th
ADS (alternative data streams), detecting      2nd
Advanced EFS Data Recovery      
Advanced Permissions page      
Advanced Property page      
Advanced Property page, inherited properties      
Advanced Property page, inherited properties, viewing      
Advanced Services Corporation      
Advertius, Donna      
AFD setting (security baseline templates)      
AH (authentication header)      2nd
AIA      
AIA, root CAs      
AIA, root CAs, configuring on      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
AirSnort      
algorithm changing      2nd
Algorithms      
algorithms, collishion resistant hashing algorithms      
algorithms, DSA (Digital Signature Algorithm) standard      
algorithms, EFS (Encrypting File System)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
algorithms, EFS, changing      2nd
algorithms, encryption algorithms      
algorithms, hashing algorithms      
algorithms, hashing algorithms, flaws      
algorithms, WEP      
Allow permission (NTFS)      
allow rules      
allow rules, IPSec      
allow rules, IPSec, Negotiate filter action      2nd 3rd 4th 5th 6th 7th 8th
alternative data streams (ADS)      [See ADS (alternative data streams)]
anonymous access      
anonymous access, authentication      
anonymous access, IPC$ service      2nd 3rd 4th
anonymous access, named pipes      
anonymous access, named pipes, limiting      2nd 3rd 4th 5th
anonymous access, restricting      
anonymous access, security principals      2nd
anonymous access, shares      
anonymous access, shares, limiting      
anonymous access, well-known SIDs      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
anonymous authentication      
ANONYMOUS implicit group      2nd
anonymous logons      
anonymous logons, authentication      
anonymous members      
anonymous SID      
anti-virus protection      
anti-virus protection, Software Restriction Policies      
anti-virus protection, Software Restriction Policies, compared      
application basic group (Authorization Manager)      
application groups (Authorization Manager)      
Application Log permission (event logs)      
application pools      
Application roles      2nd
application/user access      
applications      
Applications subfolder (GPO)      
applications, authorization      
applications, Authorization Manager      2nd 3rd 4th 5th
applications, authorization, Authorization Manager      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th
applications, authorization, Component Services      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
applications, authorization, Software Restriction Policy      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st
applications, COM applications      
applications, COM applications, Component Services      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
applications, COM+ applications      
applications, COM+ applications, Component Services      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
applications, DCOM applications      
applications, DCOM applications, Component Services      2nd 3rd 4th
applications, legacy application permissions      2nd 3rd 4th
applying      2nd
APs (access points)      
APs, 802.11 wireless access points      2nd 3rd
archiving      
archiving, certificates      
archiving, certificates, EFS (Encrypting File System)      2nd 3rd
archiving, keys      
archiving, keys, EFS (Encrypting File System)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th
as demand-dial VPNs      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
as domain controllers      2nd 3rd
ASP pages      
ASP pages, CA Web Enrollment pages      
ASP pages, CA Web Enrollment pages, enabling      2nd
ASR      
ASR, (Automated Systems Recovery) sets      2nd 3rd 4th 5th
assessing      2nd 3rd 4th 5th 6th 7th 8th 9th
assessment (security)      
assigning      
assigning, permissions      
assigning, user rights      2nd
asymmetric (public) key encryption      
asymmetric (public) key encryption, EFS (Encrypting File System)      2nd 3rd 4th 5th 6th 7th 8th 9th
asynchronous processing      
asynchronous processing, GPOs      
attack surface reduction      
Attacks      
attacks, zero-day attacks      
attention signals      
attenuation signals      
Audit Policy      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th
Audit Policy, computers      
Audit Policy, computers, choosing      
Audit Policy, configuring      2nd 3rd 4th 5th 6th 7th 8th 9th
Audit Policy, events      
Audit Policy, events, collecting      
Audit Policy, events, interpreting      2nd
Auditing      2nd 3rd 4th 5th 6th
auditing, AD objects      
auditing, AD objects, configuring      2nd 3rd 4th 5th 6th 7th 8th
auditing, audit policy      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th
auditing, Authorization Manager      2nd 3rd 4th
auditing, CA (Certificate Authority)      
auditing, CA (Certification Authority)      2nd 3rd
auditing, CA, configuring      2nd
auditing, CISA (Certified Information System Auditor)      
auditing, event log policy      
auditing, event log policy, configuring      2nd 3rd 4th 5th 6th
auditing, IAS      
auditing, IAS, configuring for      2nd 3rd 4th 5th 6th 7th
auditing, intrusion detection      
auditing, intrusion detection, compared      
auditing, IPSec      2nd
auditing, network services      
auditing, network services, DHCP      2nd 3rd 4th 5th
auditing, network services, DNS      2nd 3rd 4th
auditing, network services, WINS      
auditing, penetration testing      2nd 3rd
auditing, physical security      2nd
auditing, policies      2nd
auditing, procedures      
auditing, remote auditing      
auditing, root CAs      
auditing, root CAs, configuring on      
auditing, RRAS      
auditing, RRAS, configuring for      2nd 3rd 4th 5th 6th 7th
auditing, security configurations      2nd 3rd 4th 5th
auditing, security configurations, specific computers/users      2nd 3rd 4th 5th
auditing, security controls      2nd
auditing, standalone Windows Server 2003 computer      2nd
auditing, standards      
1 2 3 4 5 6 7 8 9
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте