Thursday, June 9, 2011

Windows Server 2008 Security






Contents at a Glance
Part I Windows Security Fundamentals
1 Subjects, Users, and Other Actors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
2 Authenticators and Authentication Protocols. . . . . . . . . . . . . . . . . . . . . 17
3 Objects: The Stuff You Want. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
4 Understanding User Account Control (UAC) . . . . . . . . . . . . . . . . . . . . . . 91
5 Firewall and Network Access Protection . . . . . . . . . . . . . . . . . . . . . . . . 115
6 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
7 Group Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
8 Auditing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Part II Implementing Identity and Access (IDA) Control
Using Active Directory
9 Designing Active Directory Domain Services for Security. . . . . . . . . . 241
10 Implementing Active Directory Certificate Services. . . . . . . . . . . . . . . 265
Part III Common Security Scenarios
11 Securing Server Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
12 Patch Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
13 Securing the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
14 Securing the Branch Office. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
15 Small Business Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
16 Securing Server Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .http://www.blogger.com/img/blank.gif . http://www.blogger.com/img/blank.gif. . . . . . . . . . . . . . . . . . . . 463
http://www.blogger.com/img/blank.gif

Another Computer Security Books
Another Network Books
Another Windows Books
Download

No comments:

Post a Comment

Related Posts with Thumbnails

Put Your Ads Here!