Wonder Club world wonders pyramid logo
×

Microsoft Windows 2000 security handbook Book

Microsoft Windows 2000 security handbook
Microsoft Windows 2000 security handbook, Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing secure applications for Windows 2000., Microsoft Windows 2000 security handbook has a rating of 3 stars
   2 Ratings
X
Microsoft Windows 2000 security handbook, Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing secure applications for Windows 2000., Microsoft Windows 2000 security handbook
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Microsoft Windows 2000 security handbook
  • Written by author Jeff Schmidt
  • Published by Indianapolis, Ind. : Que, c2000., 1999/09/30
  • Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing secure applications for Windows 2000.
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

<

Introduction 1
Network Administrators by Default 2
Religious Wars and FUD 2
Architecture of This Book 3
How to Use This Book 3
Providing Feedback 4
Enjoy! 4
I Windows 2000 System Basics
1 Architecture 7
A New Windows 8
The Windows 2000 Operating System Model 9
Windows 2000 System Processes and Files 19
Memory 20
Kernel Objects 26
Exceptions and Interrupts 28
Global Flags 30
Summary 30
2 Processes and Threads 31
The Job Object 32
Processes 37
Threads 43
Summary 44
3 Security Model 45
Securing Objects 46
Components 67
The Flow of a User Logon 73
Summary 75
4 NTFS 5.0 77
The Master File Table (MFT) 78
Files 78
Streams 80
Metadata 84
Hard Links 85
Reparse Points 86
Quotas 87
Summary 89
5 Services 91
What Is a Service? 92
Service Control Manager (SCM) 93
Service Object Security 96
Service Startup 97
Multiple Services in One Process 100
General Service Security Considerations 104
Service Security Considerations for Programmers 107
Summary 109
6 Drivers 111
Windows 2000 I/O Model 112
Kinds of Drivers 112
The File System Stack of Drivers 113
Kernel Mode Memory 116
Coding Secure Drivers 117
Driver Signing 119
Malicious Drivers 119
Summary 121
II Computer Network Security Foundations
7 The NetBIOS, NetBEUI, SMB, and TCP/IP Protocols 125
History of TCP/IP 126
The TCP/IP Suite 127
The TCP/IP Protocol Stack 128
Transport-Level Protocols 129
Application-Level Protocols 135
NetBIOS Interface 136
NetBEUI 139
Server Message Block (SMB) 140
IP Addressing 141
Name Resolution 143
TCP/IP Improvements 147
Dynamic Host Configuration Protocol 151
Dynamic Bandwidth Allocation 152
Quality of Service 152
TCP/IP Troubleshooting Tools and Strategies 153
Summary 156
8 Cryptography 157
History of Cryptography 159
Keys and Key Length 163
Types of Encryption 163
Common Encryption Algorithms 165
Applications that Use Encryption 168
Future of Cryptography 175
Summary 175
9 Introduction to IPSec 177
What's a VPN and Why Would You Use One? 178
Common Information Security Issues 179
IPSec: The Standards-based Solution to IP Security 182
The IPSec Model 187
Tunneling 189
Summary 192
10 PKI 195
Certificate Authorities 197
Digital Certificates 199
PGP "Web of Trust" 203
Digital Signatures 203
Windows 2000 and Public-Key Infrastructure 204
Why Use PKI with Windows 2000? 208
Summary 211
11 Kerberos Protocol 213
Concepts of Kerberos 214
Kerberos Components in Windows 2000 214
What Does Kerberos Do for Windows 2000? 217
Windows 2000 Authentication Process 220
What Makes Kerberos Tick? 226
Administration of Kerberos 235
Summary 239
12 X.500/LDAP 241
Keeping Track of Information About the Network 242
What Is X.500? 243
LDAP 246
Objects and Attributes 253
The Directory Schema 258
Summary 261
III Network Security in Windows 2000
13 Networking Model 265
Networking Windows 2000: What's New 266
Windows DNA 267
Active Directory 268
Network Services 270
Communication Services and APIs 273
Security in Windows 2000 Networks 276
Summary 280
14 Active Directory Services 281
The Directory 282
Active Directory Components 283
Active Directory Open Design 288
Concepts of Active Directory 291
Naming Conventions in Active Directory 298
Groups 299
Active Directory Reliance 300
Security 305
Interoperability 306
Active Directory Engine Components 308
Tools from the Windows 2000 Resource Kit 310
Summary 311
15 Authentication 313
New Protocols 314
The Key Element of Authentication--the User! 315
The Windows 2000 Security Subsystem 316
The Logon Process 319
Understanding NTLM 323
The Risks of Using NTLM 327
Understanding SSL/TLS 330
Summary 333
16 SSPI 335
Secure Networking Through the SSPI 336
Developing Secure Applications 339
Package Management API 342
Credential Management API 343
Context Management API 346
Message Support API 354
Summary 360
17 CryptoAPI 361
Secure Communication 362
Cryptography and CryptoAPI 363
CryptoAPI Administration 366
Enabling Cryptography in Your Applications 367
Summary 379
18 Microsoft Certificate Services 381
General Overview of Certificate Usage 382
Public-Key Cryptography 385
Digital Certificates 389
Certificate Authorites and Public-Key Infrastructures 393
The Certificate Services 395
Installing Certificate Services 397
Administering a CA 402
Summary 410
19 COM/DCOM/RPC 411
RPC, COM, DCOM, COM+: What's the Difference? 412
Administering COM+ Security 421
Programmatic Implementation of COM+ Security Features 429
How to Write Secure N-Tier Applications 446
Summary 447
20 VPNs 449
Why Use a VPN? 450
VPNs and Windows 2000 456
Configuring the VPN Client 459
Managing the VPN Server 466
Summary 468
21 EFS 469
EFS Concepts 470
EFS Architecture 471
How EFS Uses PKI 472
Certificate Services 473
Encryption Process 473
Decryption Process 475
Using EFS 476
Summary 489
22 DNS/DDNS/WINS 491
Domain Name System 492
Dynamic DNS 504
Security Issues with DNS 507
WINS (Windows Internet Name Service) and Windows 2000 510
Summary 513
IV Protecting Yourself and Your Network Services
23 Secure Computing Practices 517
Social Engineering 518
Trojan Programs 519
Switching Between Privileged and Non-Privileged Contexts 524
Other Secure Practices 531
Summary 532
24 Building and Administering a Secure Server 533
Creating the Secure Server 534
Managing Auditing and Creating Resource Access Permissions 543
What About System Services? 553
The Security Configuration Tools 556
Summary 566
25 Security with High-Speed Full-Time Connections 567
Dial-Up Connections 568
Enter Broadband 569
So, What to Do? 571
Network Address Translation (NAT) 573
General Broadband Security Tips 579
Summary 580
26 Detecting and Reacting to Intrusions 581
Why You Need an Intrusion Response Team 582
Building an Intrusion Response Team 583
Detecting Intrusions 584
Reacting to Intrusions 588
Summary 596
27 Recent Issues Explored 597
Why You Will Never Be Completely Secure 598
Keeping Track of New Security Issues from Microsoft 600
Reviewing Applications Regularly 603
Keeping Educated 604
Educating Your User Community 606
Checking Your Servers Regularly 607
Summary 607
28 Penetration Testing: Hack Your Own System 609
Why Penetration Testing? 610
Thinking As a Cracker 611
Realizing Threats 612
Tiger Teams 614
External Consultants 614
Getting Prepared for a Penetration Test 615
Generating an Attack Plan 615
Scouting the Site 619
Collating and Evaluating Findings 629
Exploiting the Site 633
Reporting and Regimen 636
Available Tools 639
Summary 641
29 Writing Secure Code 643
Secure Coding Practices 644
Software Security Explained 646
Price Condition Delivery Seller Action
$99.99DigitalWonderClub
Microsoft Windows 2000 security handbook, Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing secure applications for Windows 2000., Microsoft Windows 2000 security handbook has a rating of 4.9956970740103 stars
(9296 total ratings)


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Microsoft Windows 2000 security handbook, Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing secure applications for Windows 2000., Microsoft Windows 2000 security handbook

X
WonderClub Home

This item is in your Collection

Microsoft Windows 2000 security handbook, Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing secure applications for Windows 2000., Microsoft Windows 2000 security handbook

Microsoft Windows 2000 security handbook

X
WonderClub Home

This Item is in Your Inventory

Microsoft Windows 2000 security handbook, Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing secure applications for Windows 2000., Microsoft Windows 2000 security handbook

Microsoft Windows 2000 security handbook

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: