Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bragg R. — Windows Server 2003 Security: A Technical Reference
Bragg R. — Windows Server 2003 Security: A Technical Reference



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows Server 2003 Security: A Technical Reference

Автор: Bragg R.

Аннотация:

If you're a working Windows administrator, security is your #1 challenge. Now there's a single-source reference you can rely on for authoritative, independent help with every Windows Server security feature, tool, and option: Windows Server 2003 SecurityRenowned Windows security expert Roberta Bragg has brought together information that was formerly scattered through dozens of books and hundreds of online sources. She goes beyond facts and procedures, sharing powerful insights drawn from decades in IT administration and security. You'll find expert implementation tips and realistic best practices for every Windows environment, from workgroup servers to global domain architectures. Learn how to: Reflect the core principles of information security throughout your plans and processes Establish effective authentication and passwords Restrict access to servers, application software, and data Make the most of the Encrypting File System (EFS) Use Active Directory's security features and secure Active Directory itself Develop, implement, and troubleshoot group policies Deploy a secure Public Key Infrastructure (PKI) Secure remote access using VPNs via IPSec, SSL, SMB signing, LDAP signing, and more Audit and monitor your systems, detect intrusions, and respond appropriately Maintain security and protect business continuity on an ongoing basis"Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!"James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker James@accusource.net"Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003."Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com"Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security."Bob Reinsch bob.reinsch@fosstraining.com"Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information."Richard Siddaway, MCSE rsiddaw@hotmail.com"Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security."Michael VonTungeln, MCSE, CTT mvontung@yahoo.com"I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it.Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all."Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron, CPCU, CCP, AAI, Microsoft MVP - Windows Security Information Technology Consultant harrywaldronmvp@yahoo.com"Roberta Bragg's Windows Server 2003 Security offers more than just lucid coverage of how things work, but also offers sound advice on how to make them work better."Chris Quirk; MVP Windows shell/user cquirke@mvps.org"This book is an invaluable resource for anyone concerned about the security of Windows Server 2003. Despite the amount and complexity of the material presented, Roberta delivers very readable and clear coverage on most of the security-related aspects of Microsoft's flagship operative system. Highly recommended reading!"Valery Pryamikov, Security MVP, Harper Security Consulting valery.pryamikov@harper.no"As long as you have something to do with Windows 2003, I have four words for you: 'Order your copy now.'"Bernard Cheah, Microsoft IIS MVP, Infra Architect, Intel Corp. bernard@mvps.org"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized, with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron CPCU, CCP, AAI Microsoft MVP—Windows Security Information Technology Consultant


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1176

Добавлена в каталог: 25.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
auditing, user rights      
auditing, user rights, configuring      2nd
auditing, VPNs      2nd 3rd 4th 5th 6th 7th
auditing, vulnerabilities      
auditing, vulnerabilities, scanning for      2nd 3rd 4th 5th 6th 7th 8th 9th
Authentication      2nd 3rd 4th
Authentication Header (AH)      [See AH (Authentication Header)]
authentication management      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
authentication processes      2nd 3rd
authentication, accountability      
authentication, accounts      
authentication, accounts, restrictions      2nd 3rd 4th
authentication, anonymous access      
authentication, anonymous authentication      
authentication, authorization      
Authentication, biometrics      2nd
authentication, certificates      2nd 3rd
authentication, changes      
authentication, changes, impact evaluations      
authentication, clients      
authentication, clients, configuring for      2nd
authentication, COM/COM+ applications      
authentication, COM/COM+ applications, calls      2nd 3rd
authentication, computer accounts      2nd 3rd
authentication, computer accounts, processing manipulation      2nd 3rd 4th
Authentication, credentials      
authentication, crytptographic hashes      
authentication, establishing      
authentication, forest trusts      2nd 3rd
authentication, forests      2nd 3rd 4th
authentication, GPOs      
authentication, GPOs, troubleshooting      
authentication, Group Policy      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
authentication, Group Policy, Account Lockout Policy      2nd 3rd
authentication, Group Policy, Account Policy      2nd 3rd
authentication, Group Policy, local aacount policy      2nd 3rd 4th
authentication, Group Policy, Password Policy      2nd 3rd 4th
authentication, IAS (Internet Authentication Service)      
authentication, IAS, configuring      2nd 3rd 4th 5th
authentication, IAS, configuring for      2nd 3rd
authentication, IAS, installing      2nd 3rd 4th 5th 6th
authentication, IAS, wireless access security      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th
authentication, interforests      2nd 3rd 4th
authentication, Kerberos      2nd 3rd 4th 5th
authentication, Kerberos, Authenticator      
authentication, Kerberos, domain use      2nd
authentication, Kerberos, KDC (Key Distribution Center)      
authentication, Kerberos, logon process      2nd 3rd
authentication, Kerberos, policy configuration      2nd
authentication, Kerberos, Referral ticket      
authentication, Kerberos, resource access      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
authentication, Kerberos, Service ticket      
authentication, Kerberos, TGT (Ticket Granting Ticket)      
authentication, Kerberos, tickets      
authentication, LM      
authentication, LM, variations      
authentication, local logon authentication      
authentication, logon process      
authentication, logon process, anonymous logons      
authentication, logon process, domain logons      
authentication, logon process, interactive logons      2nd 3rd 4th
authentication, logon process, network logons      
authentication, monoculture      
authentication, monoculture, dangers of      
authentication, networks      2nd 3rd
authentication, networks, LM (LAN Manager)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
authentication, networks, NTLM (NT LAN Manager)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
authentication, passwords      
authentication, passwords, creating      2nd
authentication, RADIUS (Remote Authentication Dial-In User Service)      
authentication, real world applications      
authentication, RRAS      
authentication, RRAS, configuring for      2nd 3rd
authentication, securing      2nd
authentication, security logs      
authentication, security logs, monitoring      
authentication, selective authentication      
authentication, servers      
authentication, servers, configuring for      2nd
Authentication, smart cards      2nd
authentication, trusts      
authentication, trusts, selective authentication      2nd
Authenticator      
Authenticator (Kerberos)      
authoritative restores      
authoritative restores, Active Directory      2nd 3rd 4th 5th 6th 7th
Authorization      2nd 3rd 4th
authorization levels      2nd
Authorization Manager      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
Authorization Manager operations      
Authorization Manager, administration      2nd
Authorization Manager, administrators      
Authorization Manager, administrators, roles      
Authorization Manager, applications      2nd 3rd 4th 5th
Authorization Manager, auditing      2nd 3rd 4th
Authorization Manager, authorization scripts      
Authorization Manager, Authorization Store      2nd 3rd 4th 5th
Authorization Manager, dowloading      
Authorization Manager, groups      2nd 3rd 4th 5th
Authorization Manager, modes      2nd
Authorization Manager, opeartions      2nd 3rd 4th 5th
Authorization Manager, operations      
Authorization Manager, roles      2nd 3rd 4th 5th 6th
Authorization Manager, scopes      2nd 3rd 4th 5th 6th
Authorization Manager, tasks      2nd 3rd 4th 5th
authorization process      2nd 3rd 4th 5th 6th 7th 8th
authorization scripts      
authorization scripts, Authorization Manager      
Authorization Store      2nd 3rd 4th 5th
Authorization Store (Authorization Manager)      
Authorization Store, Authorization Manager      2nd 3rd 4th
Authorization Store, change auditing      2nd
authorization, access control systems      2nd 3rd 4th 5th
authorization, access tokens      
authorization, account database      
authorization, account database, protecting      2nd 3rd 4th 5th
authorization, ACEs (Access Control Entities)      
authorization, anonymous access      
authorization, anonymous access, IPC$      2nd 3rd 4th
authorization, anonymous access, security principals      2nd
authorization, anonymous access, well-known SIDs      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
authorization, Authorization Manager      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
authorization, Authorization Manager, administration      2nd
authorization, Authorization Manager, administration roles      
authorization, Authorization Manager, applications      2nd 3rd 4th 5th
authorization, Authorization Manager, auditing      2nd
authorization, Authorization Manager, authorization scripts      
authorization, Authorization Manager, Authorization Store      2nd 3rd 4th 5th
authorization, Authorization Manager, groups      2nd 3rd 4th 5th
authorization, Authorization Manager, modes      2nd
authorization, Authorization Manager, operations      2nd 3rd 4th 5th 6th
authorization, Authorization Manager, roles      2nd 3rd 4th 5th 6th
authorization, Authorization Manager, scopes      2nd 3rd 4th 5th 6th
authorization, Authorization Manager, tasks      2nd 3rd 4th 5th
authorization, COM/COM+ applications      
authorization, COM/COM+ applications, levels      2nd
authorization, Component Services      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
authorization, Component Services, COM/COM+ configuration      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
authorization, DACLs (Discretionary Access Control Lists)      
authorization, DACs (Discretionary Access Controls)      
authorization, LSA (Local Security Authority)      
authorization, LSASS (Local Security Authority Subsystem)      
authorization, MACs (Mandatory Access Controls)      
authorization, Netlogon      
authorization, permissions      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
authorization, permissions, assigning      
authorization, permissions, combining      2nd 3rd 4th 5th
authorization, permissions, explicit permissions      
authorization, permissions, inherited permissions      2nd 3rd 4th 5th 6th 7th 8th
authorization, permissions, printer permissions      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
authorization, privileges      
authorization, rights      
authorization, rights, assigning      2nd
authorization, rights, implicit rights      
authorization, rights, lockdowns      2nd 3rd 4th 5th
authorization, rights, logon rights      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
authorization, rights, predefined user rights      2nd 3rd 4th
authorization, role-based access control systems      2nd 3rd
authorization, role-based access control systems, application roles      
authorization, role-based access control systems, computer roles      2nd 3rd
authorization, role-based access control systems, custom role creation      2nd
authorization, role-based access control systems, custom roles      
authorization, role-based access control systems, group role creation      2nd
authorization, role-based access control systems, implementing      2nd 3rd 4th
authorization, role-based access control systems, operating system roles      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
authorization, rule-based access control systems      2nd 3rd
authorization, SACL (System Access Control List)      
authorization, Security Descriptors      
authorization, Security Options      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
authorization, Security Principals      
authorization, SID      
authorization, SID (security identifier)      
authorization, SID, relative identifiers      
authorization, Software Restriction Policies      2nd 3rd 4th 5th
authorization, Software Restriction Policies, anti-virus protection      
authorization, Software Restriction Policies, automatic path rules      
authorization, Software Restriction Policies, best practices      2nd 3rd
authorization, Software Restriction Policies, certificate rules      2nd 3rd
authorization, Software Restriction Policies, creating      2nd 3rd
authorization, Software Restriction Policies, designated file types      2nd 3rd
authorization, Software Restriction Policies, enforcement      2nd 3rd
authorization, Software Restriction Policies, example      
authorization, Software Restriction Policies, hacking security levels      2nd 3rd
authorization, Software Restriction Policies, hash rules      2nd 3rd 4th 5th
authorization, Software Restriction Policies, Internet zone rules      2nd
authorization, Software Restriction Policies, limitations      2nd 3rd
authorization, Software Restriction Policies, Local Security Policy      
authorization, Software Restriction Policies, path rules      2nd 3rd 4th 5th
authorization, Software Restriction Policies, registry rules      2nd 3rd 4th 5th
authorization, Software Restriction Policies, rules      2nd 3rd 4th 5th
authorization, Software Restriction Policies, Safe Mode      
authorization, Software Restriction Policies, security levels      2nd
authorization, Software Restriction Policies, troubleshooting      2nd 3rd
authorization, Software Restriction Policies, trusted publishers      2nd 3rd
authorization, SRM (Security Reference Monitor)      
authorization, SSP (Security Support Providers)      
authorization, SSPI (Security Support Provider Interface)      
authorization, well-known SIDs      
authorization, Windows security architecture      2nd 3rd 4th 5th 6th 7th 8th
authorization, Winlogon      
Authroization Manager      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
autoenrollment      
autoenrollment, subordinate CAs      
autoenrollment, subordinate CAs, configuring for      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
automated installation      2nd
Automated Systems Recovery (ASR)      [See ASR (Automated Systems Recovery)"/>]
automatic enrollment      
automatic enrollment, certificates      2nd 3rd 4th 5th 6th 7th
automatic path rules      
Automatic Update clients      
Automatic Update clients, SUS servers      
Automatic Update clients, SUS servers, configuring      2nd 3rd 4th
Automatic Updates      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Availability      
avoiding      
backing up      
backing up, keys      
backing up, keys, Certificates console      2nd 3rd
backing up, keys, certutil command      2nd
backup copying      2nd
backup defaults      2nd 3rd 4th 5th 6th
backup importation      
backup management      
Backup Operators Group      
backup policies      
backup tapes      
Backups      2nd
backups, Active Directory      2nd 3rd
backups, Active Directory, outdated backups      
backups, best practices      
backups, business continuity plans      
backups, CA (Certification Authority)      2nd
backups, certificates      
backups, certificates, EFS (Encrypting File System)      2nd 3rd
backups, copying      
backups, copying, GPMC (Group Policy Management Console)      2nd
backups, differential backups      
backups, DNS      2nd 3rd 4th
backups, EFS (Encrypting File System)      
backups, EFS, import/export functions      
backups, files      
backups, files, EFS      
backups, files/folders      
backups, files/folders, restoring      2nd 3rd 4th 5th 6th 7th
backups, IIS      2nd 3rd 4th
backups, importing      
backups, importing, GPMC (Group Policy Management Console)      
backups, incremental backups      
backups, keys      
backups, keys, EFS (Encrypting File System)      2nd 3rd
backups, managing      
backups, managing, GPMC (Group Policy Management Console)      
backups, ntbackup tool      
backups, ntbackup tool, backup defaults      2nd 3rd 4th 5th 6th
backups, ntbackup tool, command-line backups      2nd
backups, ntbackup tool, configuring      2nd 3rd 4th 5th 6th
backups, ntbackup tool, file/folder backups      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
backups, ntbackup tool, system state backups      2nd 3rd 4th
backups, password reset disks      2nd 3rd
backups, permissions      
backups, permissions, GPMC (Group Policy Management Console)      2nd
backups, policies      
backups, procedures      
backups, registry keys      
backups, remote storage data      
backups, standards      
backups, system state backups      
backups, system state backups, restoring      2nd
backups, third-party backup software      
backups, WINS      2nd 3rd 4th
Barman, Scott      
Base64 Encoded x.509 certificate format      
baseline configuration      
baseline configuration, domain controllers      2nd
baseline establishment      2nd
baseline templates      2nd 3rd 4th 5th
baseline templates, Account Policies      2nd
baseline templates, categories      
baseline templates, downloading      
baseline templates, reviewing      
baseline templates, Security Options      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
baseline templates, Security Options, TCP/IP settings      2nd 3rd 4th
baseline templates, services      2nd 3rd 4th
baseline templates, user rights      2nd 3rd 4th
baselines      
baselines, event log activity      
baselines, event log activity, establishing      2nd
basline template services      
bast practices      
bast practices, CRLs (Certificate Revocation Lists)      
batch logons      
Bejtlich, Richard      
Best practices      
Best Practices for Delegating Active Directory Administration      
best practices, account lockout policy      2nd
best practices, administrative roles      2nd 3rd
best practices, backups      
best practices, certificates      
best practices, domain controller builds/rebuilds, branch offices      
best practices, domain controllers      
1 2 3 4 5 6 7 8 9
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте