ShopSpell

Microsoft Windos Security Fundamentals For Windos 2003 SP1 and R2 [Paperback]

$117.99       (Free Shipping)
61 available
  • Category: Books (Computers)
  • Author:  Jan De Clercq, Guido Grillenmeier
  • Author:  Jan De Clercq, Guido Grillenmeier
  • ISBN-10:  1555583407
  • ISBN-10:  1555583407
  • ISBN-13:  9781555583408
  • ISBN-13:  9781555583408
  • Publisher:  Digital Press
  • Publisher:  Digital Press
  • Pages:  832
  • Pages:  832
  • Binding:  Paperback
  • Binding:  Paperback
  • Pub Date:  01-Apr-2006
  • Pub Date:  01-Apr-2006
  • SKU:  1555583407-11-MPOD
  • SKU:  1555583407-11-MPOD
  • Item ID: 100832660
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Dec 18 to Dec 20
  • Notes: Brand New Book. Order Now.
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks.

Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.

* Covers all SP1 and SP2 updates
* Details strategies for patch management
* Provides key techniques to maintain security application upgrades and updatesForeword
Preface
Chapter 1: The Challenge of Trusted Security Infrastructures

Chapter 2: Windows Security Authorities and Principals

Chapter 3: Trust Relationships
2 Authentication

Chapter 4: Introducing Windows Authentication

Chapter 5: Kerberos

Chapter 6: IIS Authentication

Chapter 7: Unix Authentication Integration

Chapter 8: Single Sign-on

Chapter 9: Introducing Windows Authorization

Chapter 10: Active Directory Authorization

Chapter 11: Active Directory Delegation

Chapter 12: Malicious Mobile Code Protection

Chapter 13: Rights Management Services

Chapter 14: l#®
Add Review