Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bragg R. — Windows Server 2003 Security: A Technical Reference
Bragg R. — Windows Server 2003 Security: A Technical Reference



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows Server 2003 Security: A Technical Reference

Автор: Bragg R.

Аннотация:

If you're a working Windows administrator, security is your #1 challenge. Now there's a single-source reference you can rely on for authoritative, independent help with every Windows Server security feature, tool, and option: Windows Server 2003 SecurityRenowned Windows security expert Roberta Bragg has brought together information that was formerly scattered through dozens of books and hundreds of online sources. She goes beyond facts and procedures, sharing powerful insights drawn from decades in IT administration and security. You'll find expert implementation tips and realistic best practices for every Windows environment, from workgroup servers to global domain architectures. Learn how to: Reflect the core principles of information security throughout your plans and processes Establish effective authentication and passwords Restrict access to servers, application software, and data Make the most of the Encrypting File System (EFS) Use Active Directory's security features and secure Active Directory itself Develop, implement, and troubleshoot group policies Deploy a secure Public Key Infrastructure (PKI) Secure remote access using VPNs via IPSec, SSL, SMB signing, LDAP signing, and more Audit and monitor your systems, detect intrusions, and respond appropriately Maintain security and protect business continuity on an ongoing basis"Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!"James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker James@accusource.net"Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003."Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com"Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security."Bob Reinsch bob.reinsch@fosstraining.com"Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information."Richard Siddaway, MCSE rsiddaw@hotmail.com"Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security."Michael VonTungeln, MCSE, CTT mvontung@yahoo.com"I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it.Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all."Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron, CPCU, CCP, AAI, Microsoft MVP - Windows Security Information Technology Consultant harrywaldronmvp@yahoo.com"Roberta Bragg's Windows Server 2003 Security offers more than just lucid coverage of how things work, but also offers sound advice on how to make them work better."Chris Quirk; MVP Windows shell/user cquirke@mvps.org"This book is an invaluable resource for anyone concerned about the security of Windows Server 2003. Despite the amount and complexity of the material presented, Roberta delivers very readable and clear coverage on most of the security-related aspects of Microsoft's flagship operative system. Highly recommended reading!"Valery Pryamikov, Security MVP, Harper Security Consulting valery.pryamikov@harper.no"As long as you have something to do with Windows 2003, I have four words for you: 'Order your copy now.'"Bernard Cheah, Microsoft IIS MVP, Infra Architect, Intel Corp. bernard@mvps.org"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized, with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron CPCU, CCP, AAI Microsoft MVP—Windows Security Information Technology Consultant


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1176

Добавлена в каталог: 25.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
goal of      2nd 3rd
GPE (Group Policy Editor)      2nd 3rd
GPMC      
GPMC (Group Polic Management Console)      2nd 3rd 4th 5th
GPMC (Group Policy Management Console)      2nd
GPMonitor      
GPO (Group Policy Object)      2nd 3rd 4th 5th 6th 7th 8th 9th
GPO (Group Policy Object);creating      2nd 3rd 4th 5th 6th 7th 8th 9th
GPO creation      2nd 3rd 4th 5th
GPO delegation      2nd 3rd 4th
GPO Editor      
GPO health      
GPO inheritance control      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
GPO reporting      2nd 3rd 4th 5th
GPO scoping      2nd
GPOs      
GPOs (Group Policy Objects)      
GPOtool      
gpresult      2nd 3rd 4th
granular permissions      
Graphical Identification and Authentication (GINA)      
gratning      
Group Policy      2nd 3rd 4th 5th 6th 7th 8th 9th
Group Policy Creator Owners group      
Group Policy Modeling      2nd 3rd 4th 5th
Group Policy property page      
Group Policy Results      
group role creation      2nd
group roles      
group scope      2nd 3rd 4th 5th
groups      
Groups Policy Settings Reference for Windows Server 2003      
Guests group      
Guidance Software      
GUIDs      
hacking contests      
hacking levels      2nd 3rd
hacking security levels      
Hardening      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
hardware clocks      
hardware security module (HSM)      
hases      
hash rules      
hashes      
hashing algorithms      
Health      
helath monitoring      2nd 3rd 4th
help desk operators      
Help Desks      
HelpServicesGroup group      
hexadecimal numbers      
Hierarchical structure      
hierarchies      
Hisecdc security template      
Hisecws security template      
HOW TO      
HSM (hardware security module)      
IAS      
IAS (Internet Authentication Service)      2nd 3rd 4th 5th
identification levels      2nd
Identity Integration Server services      
Iesacls security template      
IIS      
IKE (Internet Key Exchange)      
IKE (Internet Key Exchange) negotiation      2nd
impact evaluations      
impersonation levels      2nd
implemantation      2nd
implementation      2nd
Implementing      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
implementing in      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
implicit groups      2nd
implicit rights      
import/export functions      
importance of      
importing      2nd 3rd
importing into      
improved security      
incident responses      2nd 3rd
Incoming Forest Trust builders      
Incoming Forest Trust Builders group      
incoming forest trusts      2nd 3rd 4th
incremental backups      
incremental templates      2nd 3rd 4th
Information security      
Information Technology Professionals Resource Center (ITPRC)      
infrastructure servers      
infrastructure status      
infrastructure status checks      
inheritance      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
inheritance (permissions)      
inheritance checks      2nd
inheritance control      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
inherited permissions      
Inside Windows Server 2003 (i)      
Installation      
Installing      2nd
installing on      
Integrity      2nd 3rd
inter-domain Kerberos trusts      2nd 3rd
INTERACTIVE implicir group      
interactive logons      
interforest authentication      2nd 3rd 4th
internal resources      
Internet Authentication Service (IAS)      [See installation;IAS (Internet Authentication Service)]
Internet Information Server      
Internet Security and Acceleration (ISA) logs      
Internet Security and Acceleration Server (ISA)      [See ISA (Internet Security and Acceleration Server)]
Internet Time tab (Date and Time applet)      
Internet zone rules      
Interoperability      2nd
Interpretation      2nd 3rd
interpretation (permissions)      
interpreting      2nd
interprocess communication      
intra-forest trusts      2nd 3rd 4th
Intrusion detection      
IP Security Monitor      
IPC$ service      
IPC$ share      
ipconfig      
ipconfig command      
IPsec      2nd
IPSec blocking rules      2nd 3rd 4th 5th 6th 7th 8th 9th
IPSec filters      
IPSec policies      
ISA      
ISA (Internet Security and Acceleration) logs      
ITPRC (Information Technology Professionals Resource Center)      
Jacobs, Irwin      
KCC (Knowledge Consistency Checker)      
KDC (Key Distribution Center)      
KDC (Key Distribution Center), Kerberos      
KeepAliveTime setting (security baseline templates)      
Kerberos      
Kerberos authentication      2nd 3rd 4th 5th
Kerberos policy      2nd 3rd
key archival      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
key archivals      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
key backups      2nd 3rd
Key Distribution Center (KDC), Kerberos      
key importation      2nd 3rd
Key Recovery Agent Certificate      2nd
key recovery agents      
Keys      
keyspaces      
Knowledge Consistency Checker (KCC)      
Ksecdd      
L2TP/IPSec      2nd 3rd 4th 5th
Labeling      
lableing      
LAN Manager (LM)      [See passwords;LM (LAN Manager)]
latency      
launch permissions      2nd 3rd 4th 5th 6th
LDAP      
LDAP ports      
LDAP query groups (Authorization Manager)      
Ldp      
Least privilege      2nd
least privilege security principle      2nd
legacy application permissions      2nd 3rd 4th
legacy clients      
library applications      
lifecycles      
limitations      2nd 3rd 4th
limiting      2nd 3rd 4th 5th
link enabling      2nd
Linking      
links      
List Folder Contents file/folder permission (NTFS)      
List Folder/Read Data file/folder permission (NTFS)      
LLSRPC RPC named pipe      
LM      2nd 3rd 4th
LM (LAN Manager)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
LM password hashes      
LMCompatibilty registry value      2nd
local account access      
local account policy      2nd 3rd 4th
local account policy (Group Policy)      
local accounts      
local file permissions      
local firewalls      
local logns      
local logon authentication      
local logons      
Local Policy      2nd 3rd 4th
Local Security Authority (LSA)      [See LSA (Local Security Authority)]
Local Security Authority Subsystem (LSASS)      [See LSASS (Local Security Authority Subsystem)]
Local Security Policy      
Local Security Policy (Software Retriction Policy)      
location of      
LOCATOR named pipe      
lockdowns      2nd 3rd 4th 5th
Locking      2nd 3rd
locking down services      
Lockoutstatus.exe      
Log On To user account restriction      
logging      
Logon as a Batch Job right      2nd
Logon as a Service right      
Logon Hours user account restriction      
logon process      
logon rights      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
logon scripts      
logons      
logs      
loopback processing      2nd 3rd
Loopback property      2nd 3rd 4th
Loopback property (GPE)      2nd 3rd 4th
loopbacks      
LSA      
LSA (Local Security Authority)      
LSADUMP2      
LSASS      
machine accounts      [See computer accounts]
Machine subfolder (GPO)      
Macs      
maintaining      2nd 3rd 4th 5th 6th
Maintenance      
maintenance strategies      
malware      
manage document permission      2nd 3rd 4th
manage printer permission      
Management      
Managing      2nd 3rd
Mandatory Access Controls (MACs)      [See MACs (Mandatory Access Controls)]
manipulating      2nd 3rd 4th
master file table (MFT)      
Master keys      
Maximum Lifetime for Service Ticket policy (Kerberos)      
Maximum lifetime for User Ticket policy (Kerberos)      
Maximum lifetime for User Ticket Renewal policy (Kerberos)      
Maximum password age option (Password Policy)      
Maximum tolerance for computer clock synchronization policy (Kerberos)      
MBSA (Microsoft Baseline Security Analyzer)      
mediation security principle      2nd
message signing      
MFT (Master File Table)      
Microsoft /remoteinstall subfolder (GPO)      
Microsoft Baseline Security Analyzer (MBSA)      [See MBSA (Microsoft Baseline Security Analyzer)]
Microsoft Certified Professional Magazine Security Summit, hacking contest      
Microsoft Management Console (MMC)      [See MMC (Microsoft Management Console)]
Microsoft Operations Manager (MOM)      
Microsoft Rights Management Solutions for the Enterprise      
Microsoft subfolder (GPO)      
Microsoftindows NTsubfolder (GPO)      
migration tables      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Mimoso, Michael S      
Minimum password age option (Password Policy)      
missing files      
MMC      
Modes      
Modify file/folder permission (NTFS)      
modifying      2nd 3rd 4th 5th 6th
MOM (Microsoft Operations Manager)      
monitoing      2nd 3rd 4th 5th
Monitoring      2nd 3rd 4th 5th 6th 7th 8th
monitoring (security)      2nd 3rd 4th 5th
monoculture      
moving      2nd 3rd
moving files      2nd 3rd
MS-CHAP      
MS-CHAPv2      
multi-domain forests      2nd
multi-master replication      
multiple forests      2nd 3rd
name translation      
named pipes      
Namespaces      
NAT-T      2nd
Negotiate filter action      2nd 3rd 4th 5th 6th 7th 8th
negotiate filter action (IPSec)      
Negotiation      2nd
Net Logon debug logging      2nd
Netdiag      
netdiag command      
NetLogon      
NETLOGON share      
NETSH      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
netsh command      2nd 3rd
network access control      
Network Access Quarantine Control      2nd 3rd 4th 5th 6th 7th 8th
network authentication      
network cleartext logons      
network connectivity      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
NETWORK implicit group      
network logons      
Network security      
network services      
networking issues      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
networks      
new credentials logons      
new functioanlity      2nd 3rd
new functionality      2nd 3rd
New Group      
New Group dialog box      
No Override property      
No Override property (GPE)      
nodes      
NoDriveTypeAutoRun setting (security baseline templates)      
1 2 3 4 5 6 7 8 9
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте