Wonder Club world wonders pyramid logo
×

Windows 2000 security handbook Book

Windows 2000 security handbook
Windows 2000 security handbook, Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with fi, Windows 2000 security handbook has a rating of 3.5 stars
   2 Ratings
X
Windows 2000 security handbook, Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with fi, Windows 2000 security handbook
3.5 out of 5 stars based on 2 reviews
5
0 %
4
50 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Windows 2000 security handbook
  • Written by author Phil Cox,Thomas Sheldon
  • Published by Berkeley, Calif. : Osborne/McGraw-Hill, c2001., 2000/12/01
  • Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with fi
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Acknowledgments
Introduction
1 TCP Is King 3
2 Security Threats 13
3 Countermeasures 35
4 Security Policies and Management 55
5 An Overview of Windows 2000 Security 79
6 Network Protocols and Services in Win2K 123
7 Windows 2000 Security Risks and Solutions 143
8 Active Directory 173
9 Group Policies 235
10 User and Group Security Management 277
11 Logon and Authentication 331
12 File System and Network Share Security 359
13 Auditing 383
14 Firewalls and Proxy Servers 405
15 Microsoft Proxy Server 437
16 Remote Access and Virtual Private Networks 477
17 Client/Workstation Security 533
18 Enterprise-Wide Security 543
19 Securing the Microsoft Internet Information Server 561
20 Fault Tolerance and Data Protection 615
21 Hardening Windows 2000 653
App. A Management, Monitoring, and Auditing 683
App. B Internet Security and Acceleration (ISA) Server 699
App. C Intrusion Detection Systems 711
Index 719


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Windows 2000 security handbook, Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with fi, Windows 2000 security handbook

X
WonderClub Home

This item is in your Collection

Windows 2000 security handbook, Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with fi, Windows 2000 security handbook

Windows 2000 security handbook

X
WonderClub Home

This Item is in Your Inventory

Windows 2000 security handbook, Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with fi, Windows 2000 security handbook

Windows 2000 security handbook

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: