Wonder Club world wonders pyramid logo
×

Windows NT/2000 network security Book

Windows NT/2000 network security
Windows NT/2000 network security, This book is intended primarily for LAN administrators, system programmers, information security staff, and advanced users. Although the main focus of the book will be technical, many facets of Windows NT security involve practicing sound control procedur, Windows NT/2000 network security has a rating of 3.5 stars
   2 Ratings
X
Windows NT/2000 network security, This book is intended primarily for LAN administrators, system programmers, information security staff, and advanced users. Although the main focus of the book will be technical, many facets of Windows NT security involve practicing sound control procedur, Windows NT/2000 network security
3.5 out of 5 stars based on 2 reviews
5
0 %
4
50 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Windows NT/2000 network security
  • Written by author E. Eugene Schultz
  • Published by Indianapolis, IN : Macmillan Technical, 2000., 2000/07/27
  • This book is intended primarily for LAN administrators, system programmers, information security staff, and advanced users. Although the main focus of the book will be technical, many facets of Windows NT security involve practicing sound control procedur
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

1. Introduction and Overview.
Overview of Windows NT. Types of Windows NT Products. Functionality Versus Security. About Information Security. The Insider Versus Outsider Threat. The Current Picture for Windows. A Look at What's New in Windows 2000. Conclusion.

2. The Structure of Windows NT Security.
Architecture. The Windows NT Security Model. Types of Security Features. Privilege Structure. Object Access Authorization Architecture. How Secure Is Windows NT? Security Policy and Technology Standards: What Difference Do They Make? Conclusion.

3. The Windows NT Network Environment.
Types of Network Implementations. Some Basic Terminology. Major Network Components. Network Layouts. Local Versus Wide Area Networking. The OSI Model. Services and Protocols. NetBIOS and SMB-Based Networking in Windows. Null Sessions. NetBIOS and SMB-Based Vulnerabilities. Conclusion.

4. Basic Windows NT Security Exposures.
Types of Generic Security Exposures. Specific Windows NT Vulnerabilities. Password-Based Attacks. Conclusion.

5. Configuring Windows NT Server for Security.
Security Considerations During Windows NT Installation. Securing Critical Directories. Is Everyone a Suitable Group for Universal Access in Windows NT? Achieving Privilege Control. Securing Accounts and Groups. Securing the Registry. Setting Account Policy and User Properties Parameters. Enabling Auditing. Installing Antivirus Software. Conclusion.

6. Maintaining Windows NT Security.
Securing Administrative Shares. Securing Other Shares. Securing Trust Relationships. Making Backups. Integrity Checking. Installing Service Packs (SPs) and Hot Fixes. Useful Registry Changes. Alerts. Fault Tolerance. Conclusion.

7. Basic Network Security Measures.
Windows NT's Strengths and Weaknesses in Network Security. Deploying Windows NT Properly. Firewall Solutions. Architectural Solutions. System-Based Network Security Measures. Monitoring and Intrusion Detection. Securing Interoperability Programs. Secure System Administration Methods. Conclusion.

8. Securing Network Services and Protocols.
Securing Web Services. Securing FTP. Network News Transfer Protocol Services. Simple Network Management Protocol. Dynamic Host Configuration Protocol. Windows Internet Name Service. Domain Name Service. Remote Access Service. Conclusion.

9. Virtual Private Networks.
What Are VPNs? Microsoft Built-In VPN: Point-to-Point Tunneling Protocol. Configuring PPTP. Configuring PPTP on the Client. Non-Microsoft PPTP Solutions. Conclusion.

10. Workstation Security.
Viruses. Executable Content Languages. Workstation Considerations in Domain Security. Conclusion.

11. Security Considerations for Windows 2000.
About Windows 2000. Security Architecture. Vulnerabilities in Windows 2000-Already! Active Directory. Kerberos. Delegation. Trust. Authentication. Authorization. NTFS-5. Encrypted File System. IPSec. Smart Card Support. Basic Security Model. Recommendations. Managing Delegation. Conclusion.

Appendix A. Port-Assignment Conventions.
Appendix B. RFCs Supported by the Windows NT Implementation of TCP/IP.
Appendix C. Significant Security-Related Features of Service Packs 3-6a for Windows NT 4.0.
Appendix D. Useful Security-Related Tools from the Windows NT 4.0 Resource Kit.
Appendix E. A Script for Securing Windows NT Systems.
Appendix F. Manual Clean-Up Procedures for Tightening Security after Script Execution.
Index.


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Windows NT/2000 network security, This book is intended primarily for LAN administrators, system programmers, information security staff, and advanced users. Although the main focus of the book will be technical, many facets of Windows NT security involve practicing sound control procedur, Windows NT/2000 network security

X
WonderClub Home

This item is in your Collection

Windows NT/2000 network security, This book is intended primarily for LAN administrators, system programmers, information security staff, and advanced users. Although the main focus of the book will be technical, many facets of Windows NT security involve practicing sound control procedur, Windows NT/2000 network security

Windows NT/2000 network security

X
WonderClub Home

This Item is in Your Inventory

Windows NT/2000 network security, This book is intended primarily for LAN administrators, system programmers, information security staff, and advanced users. Although the main focus of the book will be technical, many facets of Windows NT security involve practicing sound control procedur, Windows NT/2000 network security

Windows NT/2000 network security

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: