Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Windows 2000 Server

Buy
Essential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes and explains complicated architectures through experience and research. The authors include directions on how to use security services, including Kerberos and the Encrypting File System (EFS). Most of the coverage examines behind-the-interface operations, relying on flow diagrams and uncluttered conceptual drawings to illustrate processes like smart-card authentication and the Public Key Infrastructure (PKI). Question-and-answer sections at the end of each chapter are well-chosen; one example asks about using 128-bit encryption across an international network.

Called, the one book to read if you’re responsible for the security of your Win 2K network, the updated and expanded edition of this bestselling book will provide you with full mastery of the many new security features of Windows 2000 Server. It will show you how to get all of the required security features installed and configured as well as how to build a long-term security plan for your organization.

From the Publisher
1. Migrate from NT 3.51 or NT 4.0 to Windows 2000 Server Security
Use the Windows 2000 Setup Wizard to migrate components and delegate administrative authority.
2. Master Kerberos Server Authentication
Learn how to implement tickets containing client credentials encrypted withshared keys.
3. Understand the Default File System and Registry Permissions
See why default permissions for Power Users and Users vary greatly from the permissions given to Administrators.
4.Understand Windows 2000 Security Configuration Tool Set
A central, easy-to-use program that will allow configuration of domains, organizational units, and local security.
5.Encrypting the File System for Windows 2000
Keep your data from being viewed and/or modified by any unauthorized user.
6.Implement IP Security for Microsoft Windows 2000 Server
Protect the integrity and confidentiality of information as it moves through the network and the Internet.
7.Configure Microsoft Windows 2000 Public Key Infrastructure
PKI includes new security features that will prevent man-in-the-middle attacks on corporate secrets.
8.Securing Internet Information Services
Learn how to secure a Windows 2000 server running Internet Information
Service (IIS) 5.0.
9. Register for Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!

About the Author
Chad Todd (MCSE, MCT, CNE, CAN, A+, Network+, I-Net+) is a Systems Trainer for Ikon Education Services, a global provider of technology training. He currently teaches Windows 2000 and Windows XP courses. In addition to training for Ikon, Chad also provides private consulting for small- to medium-sized companies. Chad first earned his MCSE on Windows NT 4.0 and has been working with Windows 2000 and Windows XP since their first beta releases. He was awarded Microsoft Charter Member 2000 for being one of the first 2000 engineers to attain Windows 2000 MCSE certification.
(HTML tags aren't allowed.)

Apple Training Series: Desktop and Portable Systems (3rd Edition)
Apple Training Series: Desktop and Portable Systems (3rd Edition)

This authoritative, Apple-Certified training course is designed both for professionals who support Apple computers as well as Macintosh enthusiasts who want to upgrade, service, or troubleshoot their favorite systems. Fully revised, this third edition includes Apple's new models with Intel processors, the MacBook Pro, Mac mini, and iMac....

Operating System Concepts Essentials
Operating System Concepts Essentials

Operating systems are an essential part of any computer system. Similarly, a course on operating systems is an essential part of any computer-science education. This field is undergoing rapid change, as computers are now prevalent in virtually every application, from games for children through the most sophisticated planning tools for...

Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
With the rapid increase of computational powers and availability of modern sensing, analysis and rendering equipment and technologies, computers are becoming more and more intelligent. Many research projects and commercial products have demonstrated the capability for a computer to interact with human in a natural way by looking at...

Obesity: Epidemiology, Pathophysiology, and Prevention (CRC Press series in Modern Nutrition Science)
Obesity: Epidemiology, Pathophysiology, and Prevention (CRC Press series in Modern Nutrition Science)

The obesity epidemic has spawned an unlimited array of quick-fix, rapid weight loss plans and unproven pharmaceuticals. Dangerous side effects and rebound weight gain has made the cure seem worse than the syndrome itself and left people uncertain where to turn. The only way to safely deal with the global obesity problem is to develop...

OpenGL(R) Programming Guide: The Official Guide to Learning OpenGL(R), Version 2.1 (6th Edition)
OpenGL(R) Programming Guide: The Official Guide to Learning OpenGL(R), Version 2.1 (6th Edition)

OpenGL® Programming Guide, Sixth Edition

OpenGL is a powerful software interface used to produce high-quality, computergenerated images and interactive applications using 2D and 3D objects, bitmaps, and color images.

The OpenGL® Programming Guide, Sixth...

MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X

Explore a ton of powerful Mac OS X UNIX commands

This handy, compact guide teaches you to use Mac OS X UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy