Sold Out
Book Categories |
Introduction | xix | |
Part I | Windows 2000 Security--An Overview | 1 |
Chapter 1 | Need for Security | 3 |
What Is at Risk? | 5 | |
Purpose of Security | 6 | |
Types of Attackers | 10 | |
Security Threats | 14 | |
Windows 2000 Core Security Features--A Primer | 30 | |
Windows 2000 Security Model | 32 | |
Summary | 34 | |
Check Your Understanding | 34 | |
Chapter 2 | Introducing Windows 2000 Security | 39 |
Active Directory | 40 | |
Authentication | 46 | |
Accessing Network Resources | 50 | |
Configuration Management | 52 | |
Data Encryption | 55 | |
Public Key Infrastructure | 60 | |
Summary | 62 | |
Part II | An Insight into Windows 2000 Security Features | 63 |
Chapter 3 | Authentication | 65 |
Introduction to Authentication | 67 | |
Kerberos V5 Authentication Protocol | 72 | |
Security Support Provider | 92 | |
Other Authentication Protocols | 94 | |
Summary | 98 | |
Check Your Understanding | 98 | |
Chapter 4 | Authorization and Access Control | 101 |
An Overview of Windows 2000 Access Control | 102 | |
Configuring Access Control Permissions | 124 | |
Encryption File System | 133 | |
Securing the Print Resource | 137 | |
Summary | 139 | |
Check Your Understanding | 139 | |
Chapter 5 | Security Policies | 143 |
Group Policy--An Overview | 144 | |
Group Policy Processing | 163 | |
Using Group Policy Tools | 166 | |
Windows 2000 Security Templates--An Overview | 180 | |
Summary | 192 | |
Check Your Understanding | 193 | |
Part III | Network Security | 197 |
Chapter 6 | Public Key Infrastructure | 199 |
What Is Public Key Cryptography? | 200 | |
Windows 2000 PKI | 206 | |
Summary | 224 | |
Check Your Understanding | 224 | |
Chapter 7 | Network Services | 237 |
DNS: An Overview | 238 | |
DHCP: An Overview | 246 | |
SNMP | 250 | |
RIS | 256 | |
Terminal Services | 262 | |
Summary | 266 | |
Check Your Understanding | 266 | |
Chapter 8 | Internet Security | 269 |
IPSec | 270 | |
Firewalls | 294 | |
Summary | 312 | |
Check Your Understanding | 313 | |
Chapter 9 | Internet Information Server (IIS) | 317 |
IIS: An Overview | 318 | |
IIS Authentication | 332 | |
Access Control | 342 | |
Summary | 344 | |
Check Your Understanding | 344 | |
Chapter 10 | Remote Access and VPN | 347 |
Remote Access Services | 348 | |
Virtual Private Networking | 370 | |
IAS | 381 | |
Summary | 388 | |
Check Your Understanding | 389 | |
Part IV | Other Security Features | 393 |
Chapter 11 | Reliability Features of Windows 2000 | 395 |
Diagnostic Tools | 396 | |
Windows File Protection Feature | 411 | |
Fault Tolerance | 414 | |
Backup | 420 | |
System Recovery | 424 | |
Summary | 428 | |
Check Your Understanding | 428 | |
Chapter 12 | Securing Non-Microsoft Clients | 433 |
Securing Access to UNIX Clients | 434 | |
Securing Access with NetWare | 438 | |
Securing Access with Macintosh Clients | 443 | |
Summary | 446 | |
Check Your Understanding | 446 | |
Part V | Appendixes | 449 |
Appendix A | Best Practices | 451 |
Auditing | 452 | |
Securing CAs | 453 | |
EFS | 454 | |
Security Configuration and Analysis | 454 | |
Security Templates | 455 | |
Acess Control | 456 | |
Active Directory | 457 | |
Group Policy | 458 | |
Software Installation and Management | 459 | |
Folder Redirection | 460 | |
Distributed File System (Dfs) | 460 | |
Network and Dial-up Connections | 461 | |
TCP/IP Protocol | 462 | |
DNS | 463 | |
Server Best Practices | 464 | |
DHCP | 464 | |
Internet Authentication Services | 466 | |
Remote Access Server | 468 | |
VPNs | 468 | |
IPSec Policy | 469 | |
Disk Management | 470 | |
Backing Up and Restoring Data | 470 | |
Fault Tolerance | 471 | |
Disaster Recovery | 472 | |
Network Monitor | 472 | |
Performance Monitoring | 472 | |
Disk Fragmenter | 474 | |
Appendix B | FAQs | 475 |
Index | 483 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionWindows 2000 Security
X
This Item is in Your InventoryWindows 2000 Security
X
You must be logged in to review the productsX
X
X
Add Windows 2000 Security, Cut your business costs with the Microsoft Windows 2000 security services. Windows 2000 simplifies security management, provides consistent and reliable security, supports open standards to Internet-enable businesses, and secures data transferred over a n, Windows 2000 Security to the inventory that you are selling on WonderClubX
X
Add Windows 2000 Security, Cut your business costs with the Microsoft Windows 2000 security services. Windows 2000 simplifies security management, provides consistent and reliable security, supports open standards to Internet-enable businesses, and secures data transferred over a n, Windows 2000 Security to your collection on WonderClub |