Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Professional Windows Desktop and Server Hardening (Programmer to Programmer)

Buy

Although not well known, Microsoft Windows has the best security of any popular operating system in the world today. What Windows has is poor default security. There are specific steps any professional can take to significantly increase the security of Microsoft Windows. Unfortunately, most books and the news media keep reinforcing the failed, traditional recommendations of firewalls, antivirus scanners, and end user education. Those defenses have failed and will always fail. The reason why the traditional advice fails is that most defenses and courses concentrate on defending PCs against the motivated hacker, when 99 of the attacks (and 100 of the popular attacks) are caused by malicious viruses, worms, and trojans. Defending against these mobile threats calls for specific tasks that when implemented, defeat most threats, no matter the brand of firewall or virus scanner you've purchased. Better, yet, most of the good defenses are free, included with Windows (just not implemented correctly).

This book:

  • Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products
  • Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security
  • As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years

About the Author

Roger A. Grimes (CPA, CISSP, MCSE: Security, MVP, CEH, CHFI, TICSA) is a 20-year computer security consultant, writer, and teacher. He has written over a 150 national magazine articles on computer security, and this is his fifth book on Microsoft Windows security. He has consulted for many of the world's best-known enterprises (including McAfee, Microsoft, Verisign, and IBM), multiple universities, cities and school systems, plus every branch of the U.S. armed forces. He is currently a highly rated instructor teaching Windows and Linux security in Foundstone's Ultimate Hacking classes. He has presented at many of the industry's largest conferences, including MCP TechMentor, Windows Connections, and SANS. He was a contributing editor for Windows IT Pro magazine, and is the security columnist for InfoWorld magazine. He has written several advanced security courses, including for Microsoft. He is a three-year recipient of Microsoft's Most Valuable Professional (MVP) award.

(HTML tags aren't allowed.)

Classical Fourier Analysis (Graduate Texts in Mathematics)
Classical Fourier Analysis (Graduate Texts in Mathematics)
The primary goal of this text is to present the theoretical foundation of the field of Fourier analysis. This book is mainly addressed to graduate students in mathematics and is designed to serve for a three-course sequence on the subject. The only prerequisite for understanding the text is satisfactory completion of a course in measure theory,...
Knowledge in Formation: A Computational Theory of Interpretation (Cognitive Technologies)
Knowledge in Formation: A Computational Theory of Interpretation (Cognitive Technologies)

With knowledge representation we face more or less the same problem as Augustine (354–430) when thinking about time: if nobody asks what it is, it seems clear enough, but being asked it proves to be very difficult to provide an answer.

At the beginning of our research we thought that a solution for the problem of...

Extending and Embedding Perl
Extending and Embedding Perl
An explanation of how to expand the functionality and usefulness of the Perl programming language, this guide delves into the complex issues of using real code examples from the Perl source. Detailed is how to use Perl from C programs, such as writing interfaces to C libraries, implementing Perl callbacks for C libraries, and passing...

MCTS Windows SharePoint Services 3.0 Configuration Study Guide: Exam 70-631
MCTS Windows SharePoint Services 3.0 Configuration Study Guide: Exam 70-631

The first and only Study Guide for the MCTS Windows SharePoint Services 3.0 Configuration Exam (70-631)

Windows SharePoint Services 3.0 is a free collaborative tool that allows you to share and organize documents, contacts, and calendars; create polls; moderate the content of lists and share libraries; and more. Exam 70-631 tests...

Mastering Hadoop
Mastering Hadoop

Go beyond the basics and master the next generation of Hadoop data processing platforms

About This Book

  • Learn how to optimize Hadoop MapReduce, Pig and Hive
  • Dive into YARN and learn how it can integrate Storm with Hadoop
  • Understand how Hadoop can be deployed on the cloud...
Google AdWords For Dummies (Computer/Tech)
Google AdWords For Dummies (Computer/Tech)

A completely updated reference to help you get the most value out of your AdWords campaigns

Google AdWords is a unique tool that allows you to set your own budget and create ads and choose keywords that are specifically related to your business. When your ad appears next to the search results, people can simply click your ad to learn...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy