Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Windows 2000 Server

Buy
Essential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes and explains complicated architectures through experience and research. The authors include directions on how to use security services, including Kerberos and the Encrypting File System (EFS). Most of the coverage examines behind-the-interface operations, relying on flow diagrams and uncluttered conceptual drawings to illustrate processes like smart-card authentication and the Public Key Infrastructure (PKI). Question-and-answer sections at the end of each chapter are well-chosen; one example asks about using 128-bit encryption across an international network.

Called, the one book to read if you’re responsible for the security of your Win 2K network, the updated and expanded edition of this bestselling book will provide you with full mastery of the many new security features of Windows 2000 Server. It will show you how to get all of the required security features installed and configured as well as how to build a long-term security plan for your organization.

From the Publisher
1. Migrate from NT 3.51 or NT 4.0 to Windows 2000 Server Security
Use the Windows 2000 Setup Wizard to migrate components and delegate administrative authority.
2. Master Kerberos Server Authentication
Learn how to implement tickets containing client credentials encrypted withshared keys.
3. Understand the Default File System and Registry Permissions
See why default permissions for Power Users and Users vary greatly from the permissions given to Administrators.
4.Understand Windows 2000 Security Configuration Tool Set
A central, easy-to-use program that will allow configuration of domains, organizational units, and local security.
5.Encrypting the File System for Windows 2000
Keep your data from being viewed and/or modified by any unauthorized user.
6.Implement IP Security for Microsoft Windows 2000 Server
Protect the integrity and confidentiality of information as it moves through the network and the Internet.
7.Configure Microsoft Windows 2000 Public Key Infrastructure
PKI includes new security features that will prevent man-in-the-middle attacks on corporate secrets.
8.Securing Internet Information Services
Learn how to secure a Windows 2000 server running Internet Information
Service (IIS) 5.0.
9. Register for Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!

About the Author
Chad Todd (MCSE, MCT, CNE, CAN, A+, Network+, I-Net+) is a Systems Trainer for Ikon Education Services, a global provider of technology training. He currently teaches Windows 2000 and Windows XP courses. In addition to training for Ikon, Chad also provides private consulting for small- to medium-sized companies. Chad first earned his MCSE on Windows NT 4.0 and has been working with Windows 2000 and Windows XP since their first beta releases. He was awarded Microsoft Charter Member 2000 for being one of the first 2000 engineers to attain Windows 2000 MCSE certification.
(HTML tags aren't allowed.)

The Monthly Sky Guide
The Monthly Sky Guide
Stars are scattered across the night sky like sequins on velvet. Over 2000 of them are visible to the unaided eye at any one time under the clearest conditions, but most are faint and insignificant. Only a few hundred stars are bright enough to be prominent to the naked eye, and these are plotted on the monthly sky maps in this book. The brightest...
Build Your Own AJAX Web Applications
Build Your Own AJAX Web Applications

AJAX (Asynchronous JavaScript and XML) is a new approach for developing web applications. It essentially permits users to interact with a Webpage without forcing a slow & tedious reload of the entire page after every action. This means web applications become more responsive, easier to use, and more intuitive. Build Your Own Ajax Web...

Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition
Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition

The success of a learning endeavor rests on several factors, including the complexity of the material and the level of direct involvement on the part of the student. It takes more than passive attendance at a lecture to learn most complex subjects. To truly learn and understand all of the elements of a complex issue requires exploration...


Financial Accounting: An Introduction (5th Edition)
Financial Accounting: An Introduction (5th Edition)

Financial Accounting: an Introduction is aimed at first-level undergraduates on business studies degrees taking introductory financial accounting classes; first-level specialist accounting undergraduate students; introductory core accounting for MBA and postgraduate specialist Masters students (e.g. finance, actuarial studies),...

Low-Power Analog Techniques, Sensors for Mobile Devices, and Energy Efficient Amplifiers: Advances in Analog Circuit Design 2018
Low-Power Analog Techniques, Sensors for Mobile Devices, and Energy Efficient Amplifiers: Advances in Analog Circuit Design 2018

This book is based on the 18 invited tutorials presented during the 27th workshop on Advances in Analog Circuit Design.  Expert designers from both industry and academia present readers with information about a variety of topics at the frontiers of analog circuit design, including the design of analog circuits in...

Big Java
Big Java
No one brews up a better Java guide than Cay Horstmann and in this Third Edition of Big Java he's perfected his recipe. Thoroughly updated to include Java 6, the Third Edition of Horstmann's bestselling text helps you absorb computing concepts and programming principles, develop strong problem-solving skills, and become a better programmer, all...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy