Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bragg R. — Windows Server 2003 Security: A Technical Reference
Bragg R. — Windows Server 2003 Security: A Technical Reference



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows Server 2003 Security: A Technical Reference

Автор: Bragg R.

Аннотация:

If you're a working Windows administrator, security is your #1 challenge. Now there's a single-source reference you can rely on for authoritative, independent help with every Windows Server security feature, tool, and option: Windows Server 2003 SecurityRenowned Windows security expert Roberta Bragg has brought together information that was formerly scattered through dozens of books and hundreds of online sources. She goes beyond facts and procedures, sharing powerful insights drawn from decades in IT administration and security. You'll find expert implementation tips and realistic best practices for every Windows environment, from workgroup servers to global domain architectures. Learn how to: Reflect the core principles of information security throughout your plans and processes Establish effective authentication and passwords Restrict access to servers, application software, and data Make the most of the Encrypting File System (EFS) Use Active Directory's security features and secure Active Directory itself Develop, implement, and troubleshoot group policies Deploy a secure Public Key Infrastructure (PKI) Secure remote access using VPNs via IPSec, SSL, SMB signing, LDAP signing, and more Audit and monitor your systems, detect intrusions, and respond appropriately Maintain security and protect business continuity on an ongoing basis"Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!"James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker James@accusource.net"Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003."Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com"Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security."Bob Reinsch bob.reinsch@fosstraining.com"Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information."Richard Siddaway, MCSE rsiddaw@hotmail.com"Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security."Michael VonTungeln, MCSE, CTT mvontung@yahoo.com"I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it.Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all."Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron, CPCU, CCP, AAI, Microsoft MVP - Windows Security Information Technology Consultant harrywaldronmvp@yahoo.com"Roberta Bragg's Windows Server 2003 Security offers more than just lucid coverage of how things work, but also offers sound advice on how to make them work better."Chris Quirk; MVP Windows shell/user cquirke@mvps.org"This book is an invaluable resource for anyone concerned about the security of Windows Server 2003. Despite the amount and complexity of the material presented, Roberta delivers very readable and clear coverage on most of the security-related aspects of Microsoft's flagship operative system. Highly recommended reading!"Valery Pryamikov, Security MVP, Harper Security Consulting valery.pryamikov@harper.no"As long as you have something to do with Windows 2003, I have four words for you: 'Order your copy now.'"Bernard Cheah, Microsoft IIS MVP, Infra Architect, Intel Corp. bernard@mvps.org"Roberta Bragg has developed a 'must have' manual for administrators who manage Microsoft Windows 2003 servers in their organizations. The best practices for strengthening security controls are well organized, with practical examples shared throughout the book. If you work with Windows 2003, you need this great resource."Harry L. Waldron CPCU, CCP, AAI Microsoft MVP—Windows Security Information Technology Consultant


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1176

Добавлена в каталог: 25.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
non-Internet computers      
non-repudiation      
non-standard TCP/IP ports      
non-Windows Kerberos realms      
NoNameReleaseonDemand setting (security baseline templates)      
None, Scripts only      
normal backups      
normal restores      
Notify permission (registry)      
nslookup      2nd
nslookup command      
NT LAN Manager (NTLM)      [See NTLM (NT LAN Manager)]
ntbackup tool      2nd
NTFS      
NTFS driver      
NTFS files/folders      
NTFS Permissions      
NTFS)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
NTLM      
NTLM (NT LAN Manager)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
NTLM passwords      
NTLM session security      
NTLMv2      2nd
NTLMv2 session security options      
null sessions      
number errors      
object permissions      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
Objects      
obtaining      2nd 3rd
OCSP (Online Certificate Status Protocol)      
offering      2nd 3rd 4th
offline administrator account passwords      
offline file operations      2nd 3rd
Offline Files      2nd 3rd
offline root CA      
offline root CA installation      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th
offline root CAs      
offline SUS servers      
Online Certificate Status Protocol (OCSP)      
open designs      
Open source      
Opening      
operating system roles      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
operating system support      
Operations      2nd 3rd 4th
options      
organizational units (OUs)      
Ous      
OUs (organizational units)      
outgoing forest trusts      2nd 3rd 4th
over firewalls      
Packets      
PAP      
password hash storage      
password hashes      
Password never expires user account restriction      
Password policy      2nd 3rd 4th
Password Policy (Group Policy)      
password reset disks      2nd 3rd
password resets      2nd
Passwords      
Passwords must meet complexity requirements option (Password Policy)      
patch management      2nd 3rd
patch management guides      
patches      
path rules      
path valication      
path validation      
pathping      
pathping command      
PDC Emulator FSMO      
PEAP      
penetration testing      2nd 3rd
Performance log users group      
Performance monitoring      2nd 3rd 4th 5th 6th 7th 8th 9th
PerformRouterDiscovery setting (security baseline templates)      
Perimeter      
perimeter firewalls      
perimeter networks      
permission application      2nd
permission backups      2nd
permission combinations      2nd
permission consistency      
permission inheritance      
permission restores      2nd 3rd 4th 5th
PERMISSIONS      
permit filter action (IPSec)      
permit rules      2nd 3rd 4th
persistance      
Persistent Policy Expression and Enforcement for Digital Information      
Personal Information Exchange ( PKCS #12) certificate format      
personnel issues      
Pescatore, John      
physical barriers      2nd 3rd
physical controls      
Physical security      2nd
physically securing      2nd
Ping      
Ping command      
Pipes      
PKI      2nd 3rd 4th 5th 6th 7th
PKI (Public Key Infrastrastructure)      2nd 3rd 4th 5th
PKI (Public Key Infrastructure)      2nd 3rd 4th 5th 6th 7th
PKI (Public Key Infrastructure) architecture      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th
PKI policy      
policies      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th
policies (security)      
Policy      2nd 3rd 4th
Policy Agent      
Policy Agent (IPSec)      
policy configuration      2nd
Policy management      2nd 3rd 4th
populating      
port blocking      2nd
portals      
Portqry      2nd
Ports      
Power limitations      2nd 3rd
Power Users      
PPTP (Point-to-Point Tunneling Protocol)      2nd
practice policies      
practice policy      2nd 3rd 4th 5th 6th
Practice Policy Statement      2nd 3rd 4th 5th 6th
Practice Policy Statement (PKI)      2nd 3rd 4th 5th 6th
Pre Windows 2000 Compatible Users group      
pre-staged accounts      
pre-staged computer accounts      
predefined user rights      2nd 3rd 4th
premissions      
preparing      2nd
preparing for      2nd
preventing      
Principles      
principles (security)      2nd
Print Operators group      
print permission      
PRINT$ share      
printer permissions      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
printers      
Private key      
private key exportation      2nd 3rd 4th
private key removal      
Private keys      2nd 3rd 4th
privilege attackes      
privilege attacks      
privilege limitation      
Privileges      
proactive security updates      
proactive updates      2nd 3rd 4th
procedural controls      
Procedures      2nd
process protection      
Processing      
processing manipulation      2nd 3rd 4th
proetecting      
promoting      2nd
promoting form      2nd 3rd 4th 5th 6th 7th
promoting to      2nd 3rd 4th 5th 6th 7th
promoting to domain controller      2nd
Promotion      
promotions      
proper configuration      
Properties      
property-specific permissions      2nd 3rd
proprietary information      
protecting      
protecting form      
protecting from      2nd
protocol transition      2nd 3rd
Protocols      2nd 3rd
Provisioning      
psychological acceptability      2nd
psychological acceptability security principle      2nd
psychological accesptability      2nd
public (asymmetric) key encryption      
Public key cryptography      
Public key infrastructure (PKI)      [See keys;PKI (public key infrastructure)]
Public Key Policies      
public key policy      
Public keys      
Qualcomm      
qualified subordination      2nd 3rd 4th 5th
Query Value permission (registry)      
RA (Registration Authority)      2nd
RADIUS      
Raise Domain and Forest Functional Levels in Windows Server 2003      
raising      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
rapid adoption      
RAS and IAS Servers group      
RBAC (Role-Based Access Control) programs      
reactive security updates      
reactive updates      
Read & Execute Folder
Read Attributes file/folder permission (NTFS)      
Read Control permission (registry)      
Read Extended Attributes file/folder permission (NTFS)      
Read file/folder permission (NTFS)      
Read permission (shares)      
Read permission (WebDAV)      
Read Permissions file/folder permission (NTFS)      
Read Query permission (registry)      
real world applications      
realms      
reanimating      
reccerts.exe      
recovering      2nd
Recovery      2nd
recovery agents      
recovery and fault tolerance      
recovery plans      2nd 3rd 4th
recovery policy      2nd 3rd 4th 5th 6th
recovery tools      
redirection attacks      
Referral ticket      
Referral ticket (Kerberos)      
Refresh      
registrations      
Registry      
Registry and File System section      2nd 3rd 4th 5th
Registry and File System section (GPOs)      
registry keys      
registry rules      2nd 3rd 4th 5th
relationships      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
relative identifiers      
relative identifiers (SID)      
Relevance      
reliance      
remanence (data)      
RemInstall share      
Remote access      
remote access configuration      2nd 3rd 4th 5th 6th 7th
remote access policies      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
remote administration      
remote administrative tools      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st
Remote Assistance      2nd 3rd 4th 5th
remote auditing      
Remote Authentication Dial-In User Service (RADIUS)      [See RADIUS (Remote Authentication Dial-In User Service)]
Remote Desktop client      2nd 3rd 4th 5th 6th
Remote Desktop Connection for Windows Server 2003      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
Remote desktop connections      
Remote Desktop Group Policy      2nd 3rd
Remote Desktop server      2nd 3rd 4th 5th 6th 7th
Remote desktop users group      
remote file access      
REMOTE INTERACTIVE implicit group      
remote interactive logons      
Remote Storage      2nd 3rd 4th 5th 6th
remote storage files      
removable media      
Removing      2nd 3rd 4th 5th 6th
renewal requests      
repadmin      2nd 3rd
Replication      2nd 3rd
Replication Diagnotics Tool      
Replication Monitor      
replication problems      
Replications      
Replicator group      
replmon.exe      
reporting      
requesting      2nd
Requests      
Requirements      
requiring      2nd 3rd 4th
Reset account lockout counter after option (Account Lockout Policy)      
resetting      2nd
resource access      
restores      
restoring      2nd 3rd 4th 5th 6th 7th
Restricted Groups      
restricting      2nd 3rd 4th
restricting and provisioning      2nd
restrictions      2nd 3rd 4th
reviewing      
revocation      
Right      
rights      
rights management      2nd 3rd 4th
Rights Management Solutions (RMS)      
RMS (Rights Management Solutions)      
role assignments      2nd 3rd 4th 5th
role separations      2nd 3rd 4th 5th 6th
role-based access control      
Role-Based Access Control (RBAC) programs      
role-based access control systems      
role-based control systems      2nd 3rd 4th 5th 6th 7th 8th 9th
Roles      
Rootsec security template      
router-to-router VPNs      
Routing      2nd 3rd 4th
Routing and Remote Access Service (RRAS)      [See RRAS (Routing and Remote Access Server)]
RRAS      
RRAS (Routing and Remote Access Service)      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
RRAS Server Monitor      2nd 3rd 4th
RSoP      
RSoP (Resultant Set of Policy)      2nd 3rd 4th 5th 6th 7th
rule-based access control systems      
Rules      2nd 3rd 4th 5th
runtime auditing      
S4U2Self (Service-for-User-to-Self) extension      2nd 3rd
1 2 3 4 5 6 7 8 9
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте