Windows NT Security Guide
Addison Wesley (Verlag)
978-0-201-41969-6 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
"I will recommend Steve's new book to our customers. Steve's knowledge of operating systems security and government security requirements give him a deep understanding of how to utilize Windows NT in a secure manner." Curt Kolcun Systems Engineering Manager Microsoft "I found Windows NT Security Guide to be a true gem...it's not just a good book on security, it is instructional by design." Christopher Brown San Diego Windows NT User Group A Survival Guide for Safeguarding Your Windows NT System and Its Networks! Your computers are at risk, whether they are connected to a corporate intranet or the Internet, have access to a sensitive database, or simply sit on your desk when you're not there. In the Windows NT Security Guide, Steve Sutton, a security expert and corporate trainer, shows you how to maximize Windows NT's various security protections and avoid many of its pitfalls. This book explains NT's security features from a step-by-step, how-to perspective with numerous realistic examples. Whether you are a day-to-day user or network administrator, you'll find Windows NT Security Guide an invaluable reference.Windows NT Security Guide helps you: *Spot and protect against common threats, such as data snooping and tampering, password misuse, and viruses *Configure Windows NT against Internet and intranet security risks *Build your Security Policy for user accounts and groups, domains, Access Control Lists, and the security log *Understand the basics of cryptography that play large roles in today's global Internet environment *Use some of NT's lesser-known secure installation practices and cope with its inherent security soft spots *Answer the basic question: Is Windows NT secure enough for me?
This book is accompanied by a complete set of on-line exercises and many "pencil" questions (and answers) so that you can also use it as a self-paced training tool. 0201419696B04062001
Steve Sutton is the founder of Trusted Systems Services, Inc., a computer-security consulting- and training company formed in 1986. He has been a prominent designer and teacher of secure operating systems and standards for almost two decades. 0201419696AB04062001
I. GENERAL USE.
1. Introduction.
In This Chapter We Describe.
Windows NT and Security.
Trust, Threats, and the TCB.
About This Book.
Prerequisites.
Icons, Conventions, and Typography.
2. Accounts and Domains.
In This Chapter We Describe.
Domains and Workstations.
Accounts and the Logon Session.
Summary.
3. Your Working Environment.
In This Chapter We Describe.
The Trusted Path.
Choosing Passwords.
Other Topics.
Summary.
4. ACLs.
In This Chapter We Describe.
Introduction.
Groups.
Basic ACLs for Files.
The Access Decision.
Basic ACLs for Directories.
ACL Propagation: Protecting Trees.
Assorted ACL Topics.
Summary.
5. Special Situations.
Local Accounts and Matching.
In This Section We Describe.
Using the Remote Access Service.
Windows 95.
Windows for Workgroups.
II. ADMINISTRATION.
6. Planning Domains.
In This Chapter We Describe.
What Is Security "Administration"?.
Planning Domains.
Summary.
7. Managing Groups and Accounts.
In This Chapter We Describe.
User Groups.
Accounts.
The Rights Policy.
Administrative Access.
8. Security Auditing.
In This Chapter We Describe.
The Mechanics of Auditing.
Common Auditing Scenarios.
Working with the Security Log.
Deciding What to Audit.
Summary.
9. The Internet and Intranets.
In This Chapter We Describe.
Windows NT and Intranets.
Cryptography.
Internet Information Server.
Other Networking Topics.
10. Subsystems and Other Security Features.
In This Chapter We Describe.
NT Registry.
System Policy Editor.
Printers.
Administering Windows 95.
Administering WFW.
Other Topics.
11. The TCB.
In This Chapter We Describe.
What Constitutes the TCB?
Protecting the TCB.
Summary.
12. Summary and Checklist.
General User Education.
Domain Model and Network Administration.
Groups.
General Access to Workstations.
Accounts.
Security Auditing.
The TCB.
General.
Networking.
13. NT Security Discussion.
The TCSEC.
Windows NT and the TCSEC.
Networking.
NT Security Feature by Feature.
Third-Party Watch.
Appendix A: Secure Installation.
The Registry.
File System ACLs.
Rights Policy.
Troubleshooting.
Miscellaneous.
Appendix B: Glossary.
Appendix C: Answers.
Index.
Erscheint lt. Verlag | 11.2.1997 |
---|---|
Verlagsort | Boston |
Sprache | englisch |
Maße | 188 x 233 mm |
Gewicht | 635 g |
Themenwelt | Informatik ► Betriebssysteme / Server ► Windows |
Informatik ► Betriebssysteme / Server ► Windows Server | |
Mathematik / Informatik ► Informatik ► Netzwerke | |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-201-41969-6 / 0201419696 |
ISBN-13 | 978-0-201-41969-6 / 9780201419696 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich