Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bragg R. — Windows Server 2003 Security: A Technical Reference
Bragg R. — Windows Server 2003 Security: A Technical Reference



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows Server 2003 Security: A Technical Reference

Автор: Bragg R.

Аннотация:

If you're a working Windows administrator, security is your #1 challenge. Now there's a single-source reference you can rely on for authoritative, independent help with every Windows Server security feature, tool, and option: Windows Server 2003 SecurityRenowned Windows security expert Roberta Bragg has brought together information that was formerly scattered through dozens of books and hundreds of online sources. She goes beyond facts and procedures, sharing powerful insights drawn from decades in IT administration and security. You'll find expert implementation tips and realistic best practices for every Windows environment, from workgroup servers to global domain architectures. Learn how to: Reflect the core principles of information security throughout your plans and processes Establish effective authentication and passwords Restrict access to servers, application software, and data Make the most of the Encrypting File System (EFS) Use Active Directory's security features and secure Active Directory itself Develop, implement, and troubleshoot group policies Deploy a secure Public Key Infrastructure (PKI) Secure remote access using VPNs via IPSec, SSL, SMB signing, LDAP signing, and more Audit and monitor your systems, detect intrusions, and respond appropriately Maintain security and protect business continuity on an ongoing basis"Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!"James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker James@accusource.net"Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003."Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com"Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security."Bob Reinsch bob.reinsch@fosstraining.com"Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information."Richard Siddaway, MCSE rsiddaw@hotmail.com"Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security."Michael VonTungeln, MCSE, CTT mvontung@yahoo.com"I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it.Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all."Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron, CPCU, CCP, AAI, Microsoft MVP - Windows Security Information Technology Consultant harrywaldronmvp@yahoo.com"Roberta Bragg's Windows Server 2003 Security offers more than just lucid coverage of how things work, but also offers sound advice on how to make them work better."Chris Quirk; MVP Windows shell/user cquirke@mvps.org"This book is an invaluable resource for anyone concerned about the security of Windows Server 2003. Despite the amount and complexity of the material presented, Roberta delivers very readable and clear coverage on most of the security-related aspects of Microsoft's flagship operative system. Highly recommended reading!"Valery Pryamikov, Security MVP, Harper Security Consulting valery.pryamikov@harper.no"As long as you have something to do with Windows 2003, I have four words for you: 'Order your copy now.'"Bernard Cheah, Microsoft IIS MVP, Infra Architect, Intel Corp. bernard@mvps.org"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized, with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron CPCU, CCP, AAI Microsoft MVP—Windows Security Information Technology Consultant


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1176

Добавлена в каталог: 25.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Create Files/Write Data file/folder permission (NTFS)      
Create Folders/Append Data file/folder permission (NTFS)      
Create Link permission (registry)      
Create Subkey permission (registry)      
Creating      2nd 3rd
Credentials      
CRL (Certificate Revocation List)      
CRL (Certification Revocation List)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
CRLs (certificate revocation lists)      
cross-certification      
cross-forest authentication      
cross-forest trusts      
cryptographic hashes      
cryptographic hashing      
Cryptographic Message Syntax Standard (PKCS #7) certificate format      
Cryptographic Service Provider (CSP)      
cryptographic software      
CSP (Cryptographic Service Provider)      
CTL (certificate trust list)      
custom certificate templates      2nd
custom group roles      
custom role creation      2nd
custom roles      
custom templates      2nd
DACLs      
DACLs (Discretionary Access Control Lists)      
DACs      
daily backups      
dangers of      
data access controls      
data administration      
data centers      
Data Encryption Standard (DES) algorithm      
data loss      
data modification attacks      
data remanence      
Data streams      
data streams (NTFS)      
data streams;ADS (alternative data streams)      2nd 3rd 4th 5th 6th 7th 8th 9th
Data structures      
Date and Time applet      
DC (Domain Controller Emulator)      
DC Security template      
Dcdiag      2nd 3rd
DCDiag and NetDiag in Windows 2000 Facilitate Domain Join and DC Creation      
DCOM (Distributed COM)      
DCPROMO      2nd 3rd 4th 5th 6th 7th
DCPROMO command      2nd 3rd 4th 5th 6th 7th
decrypting      2nd
decryption      2nd 3rd
default administrative roles      
default GPOs      2nd 3rd 4th
default implementation      
default permissions      2nd 3rd 4th 5th 6th 7th
default security templates      2nd
default shares      2nd 3rd
default user accounts      2nd
defaults      
Defense in depth      2nd 3rd
delegated permissions      
delegating      2nd
Delegation      
delegation levels      
Delegation of Control Wizard      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Delete file/folder permission (NTFS)      
Delete permission (registry)      
Delete Subfolders and Files file/folder permission (NTFS)      
Deleted Objects Store      
deleted users      
delta CRLs      2nd 3rd
Delta CRLs (Certificate Revocation Lists)      2nd 3rd
demand-dial connections      
demand-dial VPNs      
Deny permission (NTFS)      
deploying      
Deployment      
DES (Data Encryption Standard) algorithm      
Design      
Design Considerations for Delegation of Administration in Active Directory      
Design Considerations for the delegation of Administration in Active Directory      
design issues      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
design troubleshooting      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
designated file types      
designing      2nd 3rd 4th
designing for      2nd 3rd 4th
Details page      
detecting      2nd
determining      2nd 3rd
developing      2nd 3rd 4th 5th
DFS (Distributed File System)      
DFS$ share      
DHCP      
DHCP servers      
dial-up connections      2nd 3rd 4th
Dialog boxes      
differential backups      
Digital Signature Algorithm (DSA) standard      
Digital Signature Standard (DSS) certificates      
Digital signatures      
digital signing      2nd
directly applying      
directories      
Directory Browsing permission (WebDAV)      
Disable8dot3NameCreation setting (security baseline templates)      
DisableIPSourceRouting setting (security baseline templates)      
disabling      2nd 3rd
discontinuance of      
discovering      
Discretionary Access Control Lists (DACLs)      [See DACLs (Discretionary Access Control Lists)]
Discretionary Access Controls (DACs)      [See DACs (Discressionary Access Controls)]
disk structure      
Distinguished Encoding Rules (DER) Encoded Binary x.509 certificate format      
Distributed COM (DCOM) applications      [See DCOM (Distributed COM) applications]
Distributed file system (DFS)      
distribution      
distribution groups      
diversity of mechanism      2nd
diversity of mechanism security principle      2nd
DNS      
DNS Administrators group      
DNS clients      
DNS security monitoring      2nd 3rd 4th
DNS servers      
DNS Zones      
DNSLint      2nd 3rd 4th 5th 6th 7th 8th
DNSUpdate Proxy group      
Do not require Kerberos preauthentication user account restriction      
documenting      2nd 3rd 4th 5th
Documents and Settings subfolder (GPO)      
Domain Account Policy      
Domain Admins group      
Domain Computers group      
domain contollers      
domain controller      
domain controller deployment      2nd
Domain Controller Emulator (DC)      
domain controller LDAP ports      
domain controllers      
Domain Controllers container      
Domain Controllers group      
domain forest      2nd 3rd
domain forests      
Domain Guests group      
domain logons      
Domain Password policy      
domain use      2nd
Domain Users group      
domainname      
domainname command      
domains      
DoS (denial of service) attacks      
dowloading      
downloading      
drive root permissions      
Driveletter$ (C$, D$ etc) share
driver modes      
drivers      
DSA (Digital Signature Algorithm) standard      
Dsastat.exe      
DSLint      
dsrevoke      
dsrevoke command      
DSS (Digital Signature Standard) certificates      
DSS certificates      
DSSTORE      
DSSTORE command      
dynamic key assignments      
dynamic updates      2nd 3rd
economy of mechanism      
economy of mechanism security principle      
Edit Multi-String      
Edit Multi-String dialog box      
editing      
EFS      2nd 3rd
EFS (Encrypted File System)      
EFS (Encrypting File System)      
EFS (Encrypting File System) key archival      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
EFS certificates      
EFS Key      
EFS key archival      
efsadu      
efsaudu      
efsinfo      
efsinfo command      
ElcomSoft      
Email      
empty GPOs      
EnableDeadGWDetect setting (security baseline templates)      
EnableICMPRedirect setting (security baseline templates)      
EnablePMTUDiscovery setting (security baseline templates)      
Enabling      2nd 3rd
enabling for      2nd 3rd 4th
Encapsulated Security Protocol (ESP)      [See ESP (Encapsulated Security Protocol)]
Encase forensic program      
encrypted files      
encrypting      2nd 3rd
Encrypting File System (EFS)      [See EFS (Encrypting File System)]
Encrypting File System in Windows XP and Windows Server 2003      
Encryption      
encryption strength      2nd
Enforce password history option (Password Policy)      
Enforce User Logon Restrictions policy (Kerberos)      
enforcement      
enrollement      
Enrollment      
Enterprise Admins group      2nd
Enterprise Root Certification Authority      
Enterprise Subordinate Certification Authority      
Enumerate Sub keys permission (registry)      
EPMAPPER named pipe      
error messages      
ESP (Encapsulated Security Protocol)      2nd
establishing      2nd 3rd
Evaluation      
event auditing      
event interpretation      2nd
event log access      
Event Log settings      2nd 3rd
event logs      
Event Viewer      
EventCombMT      2nd 3rd 4th
Events      
Everyone group      
EVERYONE implicit group      
examining      
example      
examples      
EXECUTE permission      
explicit permissions      
Exporting      
extended rights      
external timeservers      
external trusts      
extranets      
face-to-face registration      
face-to-face registrations      
fail-safe defaults      
Feclient      
Federal Information Processing Standard (FIPS) 140-1      
FILE      
File access      
File and Printer Sharing mode      2nd 3rd
file backups      
file decryption      2nd
file descriptors      2nd
file encryption      2nd 3rd
file formats      
file permissions      
file recovery      2nd 3rd
File Replication Service      
File Replication System (FRS)      [See FRS (File Replication System)]
file sharing      2nd 3rd 4th 5th
file/folder color-coding      2nd 3rd
file/folder permissions      2nd 3rd 4th 5th
Files      
files/folders      
filter actions      
Filtering      
Filters      
firewall ports      
Firewalls      
Five Flexible Single Master Operations (FSMOs)      [See FSMOs (Five Flexible Single Master Opertations)]
flaws      
floppies      
folder creation      
folder protection      
Folders      2nd
footprinting attacks      
for remote access      2nd 3rd
Forest      
forest functional levels      
forest trusts      2nd 3rd
forest-wide permissions      
Forests      
forests (domains)      
Formatting      
forwarders      
FRS      
FRS (File Replication Service)      
FRS error messages      
FRS functionality      
FRS Health Check      2nd
FRS replication      
FRS replication troubleshooting      2nd 3rd 4th 5th 6th 7th
FRS traffic levels      
Frsdiag.exe      2nd
FSMOs (Five Flexible Single Master Operations)      
Full Control file/folder permission (NTFS)      2nd
Full Control permission (registry)      
Full Control permission (shares)      
functional levels      2nd 3rd 4th 5th
Functionality      
functionality levels      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
FxsSrvCp$ share      
GCs (Global Catalog) servers      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
GCs (Global Catlog) servers      2nd
generic permissions      
GINA (Graphical Identification and Authentication)      
Global Catalog (GCs) servers      [See GCs (Global Catalog) servers]
Global Catalog replication      
1 2 3 4 5 6 7 8 9
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте