In this blog, 25.000 books will be uploaded, so far more than 1400 books are available. Books, will be added daily, please check this blog daily.
Thursday, June 9, 2011
Windows Server 2008 Security
Contents at a Glance
Part I Windows Security Fundamentals
1 Subjects, Users, and Other Actors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
2 Authenticators and Authentication Protocols. . . . . . . . . . . . . . . . . . . . . 17
3 Objects: The Stuff You Want. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
4 Understanding User Account Control (UAC) . . . . . . . . . . . . . . . . . . . . . . 91
5 Firewall and Network Access Protection . . . . . . . . . . . . . . . . . . . . . . . . 115
6 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
7 Group Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
8 Auditing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Part II Implementing Identity and Access (IDA) Control
Using Active Directory
9 Designing Active Directory Domain Services for Security. . . . . . . . . . 241
10 Implementing Active Directory Certificate Services. . . . . . . . . . . . . . . 265
Part III Common Security Scenarios
11 Securing Server Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
12 Patch Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
13 Securing the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
14 Securing the Branch Office. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
15 Small Business Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
16 Securing Server Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .http://www.blogger.com/img/blank.gif . http://www.blogger.com/img/blank.gif. . . . . . . . . . . . . . . . . . . . 463
http://www.blogger.com/img/blank.gif
Another Computer Security Books
Another Network Books
Another Windows Books
Download
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment