Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bragg R. — Windows Server 2003 Security: A Technical Reference
Bragg R. — Windows Server 2003 Security: A Technical Reference



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows Server 2003 Security: A Technical Reference

Автор: Bragg R.

Аннотация:

If you're a working Windows administrator, security is your #1 challenge. Now there's a single-source reference you can rely on for authoritative, independent help with every Windows Server security feature, tool, and option: Windows Server 2003 SecurityRenowned Windows security expert Roberta Bragg has brought together information that was formerly scattered through dozens of books and hundreds of online sources. She goes beyond facts and procedures, sharing powerful insights drawn from decades in IT administration and security. You'll find expert implementation tips and realistic best practices for every Windows environment, from workgroup servers to global domain architectures. Learn how to: Reflect the core principles of information security throughout your plans and processes Establish effective authentication and passwords Restrict access to servers, application software, and data Make the most of the Encrypting File System (EFS) Use Active Directory's security features and secure Active Directory itself Develop, implement, and troubleshoot group policies Deploy a secure Public Key Infrastructure (PKI) Secure remote access using VPNs via IPSec, SSL, SMB signing, LDAP signing, and more Audit and monitor your systems, detect intrusions, and respond appropriately Maintain security and protect business continuity on an ongoing basis"Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!"James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker James@accusource.net"Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003."Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com"Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security."Bob Reinsch bob.reinsch@fosstraining.com"Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information."Richard Siddaway, MCSE rsiddaw@hotmail.com"Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security."Michael VonTungeln, MCSE, CTT mvontung@yahoo.com"I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it.Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all."Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron, CPCU, CCP, AAI, Microsoft MVP - Windows Security Information Technology Consultant harrywaldronmvp@yahoo.com"Roberta Bragg's Windows Server 2003 Security offers more than just lucid coverage of how things work, but also offers sound advice on how to make them work better."Chris Quirk; MVP Windows shell/user cquirke@mvps.org"This book is an invaluable resource for anyone concerned about the security of Windows Server 2003. Despite the amount and complexity of the material presented, Roberta delivers very readable and clear coverage on most of the security-related aspects of Microsoft's flagship operative system. Highly recommended reading!"Valery Pryamikov, Security MVP, Harper Security Consulting valery.pryamikov@harper.no"As long as you have something to do with Windows 2003, I have four words for you: 'Order your copy now.'"Bernard Cheah, Microsoft IIS MVP, Infra Architect, Intel Corp. bernard@mvps.org"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized, with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron CPCU, CCP, AAI Microsoft MVP—Windows Security Information Technology Consultant


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1176

Добавлена в каталог: 25.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
best practices, domain controllers, physical security      2nd
best practices, EFS (Encrypting File System)      2nd 3rd
best practices, file and printer sharing      2nd
best practices, Group Policy      2nd
best practices, IAS Internet Authentication Service)      
best practices, IPSec      
best practices, password policy      2nd
best practices, recovery      
best practices, recovery, EFS (Encrypting File System)      2nd
best practices, RRAS (Routing and Remote Access Service)      
best practices, security patches      
best practices, security vunerability announcements      
best practices, shared folder shadow copies      
best practices, tempering      
best practices, trusts      2nd
best practices, wireless access      
Beyond Intrusion Detection, The (i)      
BIO passwords      
Biometrics      
biometrics, network authentication      2nd
BIOS passwords      
block filter action (IPSec)      
Block Inheritance property      2nd
Block Inheritance property (GPE)      2nd
blocked inheritance      
blocked inheritance, overriding      
blocked inheritance, overriding, NTFS      2nd 3rd
Blocking      
blocking at      
blocking rules      
blocking rules, IPSec      
blocking rules, IPSec, creating      2nd 3rd 4th 5th 6th 7th 8th 9th
blocking, ports      
blocking, ports, IPSec filters      2nd
bootmode      
bootmode command      
Boswell, Bill      
branch offices      
branch offices, domain contollers      
branch offices, domain contollers, building/rebuilding best practices      
branch offices, domain controllers      
branch offices, domain controllers, physical security      2nd 3rd 4th 5th 6th 7th
branch/small offices      2nd 3rd 4th 5th 6th 7th
bridge CA      2nd
bridge CAs      
bridge CAs, PKI (Public Key Infrastrastructure)      2nd
building/rebuilding      
Built-in container (Active Directory)      
Built-in container (Active Directory), groups      
built-in groups      
built-in groups, standalone servers      
business continuity plans      
business continuity plans, backups      
Bypass Traverse Checking User right      
CA
CA (certificate authority)      
CA (Certificate Authority) keys      
CA (certification authority)      
CA (Certification Authority), auditing      2nd 3rd
CA (Certification Authority), backups      2nd
CA Web Enrollment pages      
CA Web Enrollment pages, ASP pages      
CA Web Enrollment pages, ASP pages, enabling      2nd
CA, auditing      
CA, auditing, configuring      2nd
CA, domain controllers      
CA, domain controllers, installing on      
CA, PKI      
CA, PKI (Public Key Infrastructure)      2nd
CA, PKI, bridge CAs      2nd
CA, PKI, cross-certification      2nd 3rd 4th 5th
CA, PKI, Enterprise Root Certification Authority      
CA, PKI, Enterprise Subordinate Certification Authority      
CA, PKI, hierarchies      2nd 3rd 4th 5th 6th 7th 8th
CA, PKI, HSM (hardware security module)      
CA, PKI, offline root CA installation      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th
CA, PKI, roles      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
CA, PKI, standalone root CA      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
CA, PKI, Standalone Root Certification Authority      
CA, PKI, Standalone Subordinate Certification Authority      
CA, PKI, subordinate CA configuration      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
CA, PKI, subordinate CA installation      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th
CA, PKI, Verisign      
cachedInteractive logons      
Caching      
caching, GCs (Global Catlog) servers      2nd 3rd
caching, GCs (Global Catlog) servers, universal group membership caching      2nd 3rd
call authentication levels      2nd 3rd
callbacks      
callbacks, demand-dial connections      
callbacks, demand-dial connections, configuring for      
Calls      
calls, COM/COM+ applications      
calls, COM/COM+ applications, authentication levels      2nd 3rd
capolicy.inf file      
capolicy.inf file, creating      
capolicy.inf file, offline root CAs      
capolicy.inf file, offline root CAs, installing      2nd
CAs (Certificate Authroities)      2nd 3rd 4th 5th 6th 7th 8th
catching      2nd 3rd
Categories      
CD-ROMs      
CD-ROMs, remote access      
CD-ROMs, remote access, restricting      
CDP      
CDP, root CAs      
CDP, root CAs, configuring on      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Cert Publishers group      
certificate archival      
certificate backups      2nd 3rd
certificate chaining      2nd 3rd 4th 5th 6th 7th 8th 9th
Certificate console      
Certificate console, certificates      
Certificate console, certificates, requesting from      2nd 3rd 4th 5th 6th
certificate discovery      
certificate distribution      2nd 3rd 4th 5th 6th
certificate enrollment      
certificate enrollment restriction      2nd 3rd 4th 5th
certificate enrollment, restricting      
certificate enrollment, restricting, PKI (Public Key Infrastructure)      2nd 3rd 4th 5th
certificate exportation      2nd 3rd 4th 5th
certificate importation      2nd 3rd
certificate lifecycles      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th
certificate managers      
certificate managers, restricting      
certificate recovery      
certificate renewals      
certificate requests      2nd 3rd 4th
Certificate Revocation      
certificate revocation lists (CRLs)      
certificate rules      
certificate rules, software restriction policies      2nd 3rd
Certificate Services      2nd
Certificate Services, PKI      
certificate services, PKI (Public Key Infrasturcture)      
certificate services, PKI, certificate enrollment restriction      2nd 3rd 4th 5th
certificate services, PKI, certificate stores      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
certificate services, PKI, certificate templates      2nd 3rd 4th 5th
certificate services, PKI, certificate validity periods      
certificate services, PKI, CRL (Certificate Revocation List)      2nd 3rd 4th 5th 6th 7th 8th 9th
certificate services, PKI, EFS (Encrypting File System) key archival      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
certificate services, PKI, implementation      2nd
certificate services, PKI, offline root CA installation      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th
certificate services, PKI, practice policy      2nd 3rd 4th 5th 6th
certificate services, PKI, standalone root CA configuration      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
certificate services, PKI, subordinate CA configuration      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
certificate services, PKI, subordinate CA installation      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th
certificate services, PKI, subordinate CA role separation      2nd 3rd 4th 5th 6th
certificate services, PKI, Windows Server 2003 architecture      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th
certificate stores      
certificate stores, PKI (Public Key Infrastructure)      2nd 3rd 4th 5th 6th
certificate stores, PKI, populating      
certificate template superceding      2nd
certificate templates      
certificate templates, best practices      
certificate templates, custom templates      
certificate templates, custom templates, creating      2nd 3rd 4th
certificate templates, permissions      
certificate templates, permissions, setting      2nd
certificate templates, PKI (Public Key Infrastructure)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
certificate templates, PKI, custom templates      2nd
certificate templates, PKI, self-signed certificates      2nd
certificate templates, PKI, standard template types      
certificate validity periods      
certificates      
Certificates console      
Certificates snap-in (EFS)      
certificates, backing up      
certificates, backing up, EFS (Encrypting File System)      2nd 3rd
certificates, best practices      
certificates, EFS      
certificates, EFS (Encrypting File System)      
certificates, EFS, discovering      
certificates, EFS, third-party certificates      
certificates, EFS, viewing      
certificates, importing      
certificates, importing, EFS (Encrypting File System)      2nd 3rd
certificates, Key Recovery Agent Certificate      2nd
certificates, network authentication      2nd
certificates, permissions      
certificates, permissions, setting      
certificates, PKI      
certificates, PKI (Public Key Infrastructure)      
certificates, PKI, (Public Key Infrastructure)      2nd 3rd 4th 5th 6th 7th
certificates, PKI, archiving      
certificates, PKI, automatic enrollment      2nd 3rd 4th 5th 6th 7th
certificates, PKI, bridge CAs      2nd
certificates, PKI, chaining      2nd 3rd 4th 5th 6th 7th 8th 9th
certificates, PKI, cross-certification      2nd 3rd 4th 5th
certificates, PKI, Details page      
certificates, PKI, distribution      2nd 3rd 4th 5th 6th
certificates, PKI, DSS certificates      
certificates, PKI, enrollment      2nd
certificates, PKI, exporting      2nd 3rd 4th 5th
certificates, PKI, file formats      
certificates, PKI, lifecycles      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th
certificates, PKI, qualified subordination      2nd 3rd 4th 5th
certificates, PKI, recovery      
certificates, PKI, renewal requests      
certificates, PKI, requests      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
certificates, PKI, revocation      
certificates, PKI, superceding      2nd
certificates, PKI, V2 certificates      
certificates, requesting      
certificates, requesting, EFS (Encrypting File System)      2nd 3rd 4th
certificates, self-signed certificates      
certificates, validity periods      
Certified Information System Auditor (CISA)      
certreq      2nd
certreq command      
certutil      2nd 3rd
certutil command      
Chaining      
Change management      2nd 3rd 4th 5th 6th
Change permission (shares)      
Change Permissions file/folder permission (NTFS)      
changes to      2nd 3rd 4th 5th
changing      2nd
CHAP      
checking      2nd
checking for      
checkrepl      
child objects      
choosing      
CIA      
Cipher      2nd 3rd 4th 5th
cipher command      2nd 3rd 4th 5th
CISA (Certified Information System Auditor)      
Client      
client patch management strategies      
client side configuration      
client-side extensions      
Clients      
clinets      
clock (computer)      
Clustering      2nd
CMAK (Connection Manager Administration Kit)      
Collection      
collision resistant hashing algorithms      
Collisions      
color-coding      
COM (Component Object Model) applications      
COM applications      
COM+      
COM+ (Component Object Model Plus) applications      
COM+ applications      
COM/COM+ applications      
COM/COM+ configuration      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
combining      2nd 3rd 4th 5th
COMCFG share      
command-line administration      
command-line backups      
Commands      
Communication      
communications      
COMNAP named pipe      
COMNODE named pipe      
compared      
Compatws security template      
complet mediation      2nd
complete mediation      2nd
complete mediation security principle      2nd
Component Object Model (COM) applications      [See COM (Component Object Model) applications]
Component Object Model Plus (COM+) applications      [See COM+ (Component Object Model Plus) applications]
Component Services      2nd 3rd 4th
Component Services Tool      
components      2nd 3rd
Componet Services) applications      2nd 3rd 4th
computer account management      2nd
computer accounts      
computer clocks      
Computer containers      
Computer Management console      
computer role security      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st
computer roles      2nd 3rd
computer startup      
COMPUTERNAME      
computername command      
Computers      
Confidentiality      2nd 3rd 4th
confidentiality, integrity, and auditing (CIA)      [See CIA (confidentiality integrity and
Configuration      
configuration options      2nd 3rd 4th 5th 6th
Configuring      2nd 3rd
configuring as      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
configuring for      2nd
connection process      
Connectivity      
connectivity (network)      
consistency ensurance      
constrained delegation      2nd 3rd 4th 5th
constrained dlegation      
Control mechanisms      
Control Panel      
controlling      2nd 3rd
copy backups      
copying      
copying files      2nd 3rd
corrupt files      
corrupt/missing files      
1 2 3 4 5 6 7 8 9
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте