Sold Out
Book Categories |
Acknowledgments | ||
Introduction | ||
Ch. 1 | Overview of the Windows NT Security Subsystem | 1 |
Ch. 2 | Securable Objects | 11 |
Ch. 3 | Security Identifiers | 23 |
Ch. 4 | Security Descriptors | 51 |
Ch. 5 | Associating Security Descriptors with Objects | 93 |
Ch. 6 | Access Tokens | 139 |
Ch. 7 | Auditing | 191 |
Ch. 8 | Security and Windows NT Services | 201 |
App. A | Network Security Concepts | 231 |
App. B | Windows NT Authentication | 245 |
App. C | Class C2 Computer System Requirements as Defined by the US Department of Defense | 255 |
App. D | Win32 Security API Functions | 259 |
App. E | Bibliography | 267 |
Index | 269 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionWindows NT security
X
This Item is in Your InventoryWindows NT security
X
You must be logged in to review the productsX
X
X
Add Windows NT security, Want to understand how Windows NT security implementation works? Then this is the book for you. You will learn all you need to know about: - Windows NT securable objects - Fundamental NT security concepts such as security identifiers, access masks, , Windows NT security to the inventory that you are selling on WonderClubX
X
Add Windows NT security, Want to understand how Windows NT security implementation works? Then this is the book for you. You will learn all you need to know about: - Windows NT securable objects - Fundamental NT security concepts such as security identifiers, access masks, , Windows NT security to your collection on WonderClub |