ShopSpell

Professional Windos Desktop and Server Hardening [Paperback]

$35.99     $50.00    28% Off      (Free Shipping)
100 available
  • Category: Books (Computers)
  • Author:  Grimes, Roger A.
  • Author:  Grimes, Roger A.
  • ISBN-10:  0764599909
  • ISBN-10:  0764599909
  • ISBN-13:  9780764599903
  • ISBN-13:  9780764599903
  • Publisher:  Wrox
  • Publisher:  Wrox
  • Pages:  604
  • Pages:  604
  • Binding:  Paperback
  • Binding:  Paperback
  • Pub Date:  01-Mar-2006
  • Pub Date:  01-Mar-2006
  • SKU:  0764599909-11-MPOD
  • SKU:  0764599909-11-MPOD
  • Item ID: 100245768
  • List Price: $50.00
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Jan 26 to Jan 28
  • Notes: Brand New Book. Order Now.
  • Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products
  • Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security
  • As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years
  • The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book
Acknowledgments.

Introduction.

Part I: The Basics in Depth.

Chapter 1: Windows Attacks.

Chapter 2: Conventional and Unconventional Defenses.

Chapter 3: NTFS Permissions 101.

Part II: OS Hardening.

Chapter 4: Preventing Password Crackers.

Chapter 5: Protecting High-Risk Files.

Chapter 6: Protecting High-Risk Registry Entries.

Chapter 7: Tightening Services.

Chapter 8: Using IPSec.

Part III: Application Security.

Chapter 9: Stopping Unauthorized Execution.

Chapter 10: Securing Internet Explorer.

Chapter 11: Protecting E-mail.

Chapter 12: IIS Security.

Chapter 13: Using Encrypting File System.

Part IV: Automating Security.

Chapter 14: Group Policy Explained.

Chapter 15: Designing a Secure Active Directory Infrastructure.

Book Summary.

lÃa

Add Review