Professional Windows Desktop and Server Hardening
Wrox Press (Verlag)
978-0-7645-9990-3 (ISBN)
Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products
Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security
As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years
The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book
Roger A. Grimes (CPA, CISSP, MCSE: Security, MVP, CEH, CHFI, TICSA) is a 20-year computer security consultant, writer, and teacher. He has written over a 150 national magazine articles on computer security, and this is his fifth book on Microsoft Windows security. He has consulted for many of the world’s best-known enterprises (including McAfee, Microsoft, Verisign, and IBM), multiple universities, cities and school systems, plus every branch of the U.S. armed forces. He is currently a highly rated instructor teaching Windows and Linux security in Foundstone’s Ultimate Hacking classes. He has presented at many of the industry’s largest conferences, including MCP TechMentor, Windows Connections, and SANS. He was a contributing editor for Windows IT Pro magazine, and is the security columnist for InfoWorld magazine. He has written several advanced security courses, including for Microsoft. He is a three-year recipient of Microsoft’s Most Valuable Professional (MVP) award, and was the creator and team leader of the successful www.hackiis6.com contest.
Acknowledgments. Introduction.
Part I: The Basics in Depth.
Chapter 1: Windows Attacks.
Chapter 2: Conventional and Unconventional Defenses.
Chapter 3: NTFS Permissions 101.
Part II: OS Hardening.
Chapter 4: Preventing Password Crackers.
Chapter 5: Protecting High-Risk Files.
Chapter 6: Protecting High-Risk Registry Entries.
Chapter 7: Tightening Services.
Chapter 8: Using IPSec.
Part III: Application Security.
Chapter 9: Stopping Unauthorized Execution.
Chapter 10: Securing Internet Explorer.
Chapter 11: Protecting E-mail.
Chapter 12: IIS Security.
Chapter 13: Using Encrypting File System.
Part IV: Automating Security.
Chapter 14: Group Policy Explained.
Chapter 15: Designing a Secure Active Directory Infrastructure.
Book Summary.
Index.
Erscheint lt. Verlag | 12.5.2006 |
---|---|
Sprache | englisch |
Maße | 189 x 234 mm |
Gewicht | 878 g |
Einbandart | Paperback |
Themenwelt | Informatik ► Betriebssysteme / Server ► Windows |
Informatik ► Betriebssysteme / Server ► Windows Server | |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-7645-9990-9 / 0764599909 |
ISBN-13 | 978-0-7645-9990-3 / 9780764599903 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich