Professional Windows desktop and server hardening (Record no. 13101)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01845cam a22002414a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 0764599909 (paper/website) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780764599903 (paper/website) |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | GRI |
100 1# - MAIN ENTRY--AUTHOR NAME | |
Personal name | Grimes, Roger A. |
245 10 - TITLE STATEMENT | |
Title | Professional Windows desktop and server hardening |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Indianapolis, IN : |
Name of publisher | Wiley, |
Year of publication | c2006. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xxvi, 572 p. : |
Other physical details | ill. ; |
500 ## - GENERAL NOTE | |
General note | "Programmer to programmer"--Cover. |
500 ## - GENERAL NOTE | |
General note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Acknowledgments. Introduction. Part I: The Basics in Depth. Chapter 1: Windows Attacks. Chapter 2: Conventional and Unconventional Defenses. Chapter 3: NTFS Permissions 101. Part II: OS Hardening. Chapter 4: Preventing Password Crackers. Chapter 5: Protecting High-Risk Files. Chapter 6: Protecting High-Risk Registry Entries. Chapter 7: Tightening Services. Chapter 8: Using IPSec. Part III: Application Security. Chapter 9: Stopping Unauthorized Execution. Chapter 10: Securing Internet Explorer. Chapter 11: Protecting E-mail. Chapter 12: IIS Security. Chapter 13: Using Encrypting File System. Part IV: Automating Security. Chapter 14: Group Policy Explained. Chapter 15: Designing a Secure Active Directory Infrastructure. Book Summary. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Today's uber viruses, worms, and trojans may seem more damaging than ever, but the attacking malware and malicious hackers are using the same tricks they always have. With this book, Microsoft MVP Roger Grimes exposes the real threat to Windows computers and offers practical guidance to secure those systems |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer networks |
856 41 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://www.loc.gov/catdir/toc/ecip067/2006003777.html |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://www.loc.gov/catdir/enhancements/fy0629/2006003777-d.html |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://www.loc.gov/catdir/enhancements/fy0740/2006003777-b.html |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Lending Books |
Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Accession Number | Koha item type |
---|---|---|---|---|---|---|---|---|---|
Reference | Main Library | Main Library | Stacks | 23/10/2009 | Purchased | 4595.85 | 005.82 GRI | 011609 | Lending Books |
Reference | Main Library | Main Library | Reference | 23/10/2009 | Purchased | 4595.85 | 005.8 GRI | 011608 | Reference Books |