Professional Windows desktop and server hardening
Material type: TextPublication details: Indianapolis, IN : Wiley, c2006Description: xxvi, 572 p. : illISBN: 0764599909 (paper/website); 9780764599903 (paper/website)Subject(s): Computer security | Computer networksDDC classification: 005.8 Online resources: Click here to access online | Click here to access online | Click here to access onlineItem type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
Lending Books | Main Library Stacks | Reference | 005.82 GRI (Browse shelf(Opens below)) | Available | 011609 | ||
Reference Books | Main Library Reference | Reference | 005.8 GRI (Browse shelf(Opens below)) | Available | 011608 |
"Programmer to programmer"--Cover.
Includes index.
Acknowledgments. Introduction. Part I: The Basics in Depth. Chapter 1: Windows Attacks. Chapter 2: Conventional and Unconventional Defenses. Chapter 3: NTFS Permissions 101. Part II: OS Hardening. Chapter 4: Preventing Password Crackers. Chapter 5: Protecting High-Risk Files. Chapter 6: Protecting High-Risk Registry Entries. Chapter 7: Tightening Services. Chapter 8: Using IPSec. Part III: Application Security. Chapter 9: Stopping Unauthorized Execution. Chapter 10: Securing Internet Explorer. Chapter 11: Protecting E-mail. Chapter 12: IIS Security. Chapter 13: Using Encrypting File System. Part IV: Automating Security. Chapter 14: Group Policy Explained. Chapter 15: Designing a Secure Active Directory Infrastructure. Book Summary.
Today's uber viruses, worms, and trojans may seem more damaging than ever, but the attacking malware and malicious hackers are using the same tricks they always have. With this book, Microsoft MVP Roger Grimes exposes the real threat to Windows computers and offers practical guidance to secure those systems
There are no comments on this title.