Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing Windows 2000 Step by Step

Buy
Securing Windows 2000 Step by Step, 9780967299297 (0967299292), SANS Press, 2001
This guide is the joint product of a community of Windows security managers and experts, who have voluntarily shared their experiences in this field so that others may benefit. The guide can be used to substantially improve the security of Windows 2000 computers and networks.

Just as Windows 2000 is the next evolution of Windows NT 4.0, this document is built on Securing Windows NT 4.0 Step-by-Step Guide, also produced by The SANS Institute. It was the joint product of Windows security managers and experts who, together, support more than 286,000 users and have more than 380 years of Windows security experience. Those professionals continue to contribute on a regular basis.

This booklet largely applies to both Windows 2000 Server environments and, almost as importantly, Windows 2000 Professional environments. Since Windows environments are almost universally networked and/or part of a domain, securing individual workstations is as important as securing the servers.

SANS' Step-by-Step series raises information sharing to a new level in which experts share techniques they have found to be effective. They integrate the techniques into a step-by-step plan and then subject the plan, in detail, to the close scrutiny of other experts. The process continues until consensus is reached. This is a difficult undertaking. A large number of people spend a great deal of time making sure the information is useful and correct.

Windows environments are constantly evolving as new applications and users are added, as new threats and responses emerge, as new Hot Fixes and Service Packs are offered, and as new versions are released. Hence no prescription for setting up a secure environment can claim to be a comprehensive and timeless formula for absolute safety.

Though the booklet provides valuable guidance, it is not a text on the subject. Texts provide background on the way Windows 2000 security, cryptography, and other relevant technologies work, and on less sensitive administrative techniques. In addition, the booklet can not replace in-depth training by skilled instructors. Such security training should be mandatory for new Windows system and security administrators where security is important. Furthermore, acting on all the steps in this booklet does not obviate the need for an overall corporate security policy, effective user education, or for monitoring electronic sources of security updates and acting upon the information they provide. The appendix lists the most popular Windows NT/2000 security web sites and mailing lists that are popular sources of new security threats and solutions.

Securing Windows 2000 Step-by-Step parallels the phases of the implementation and operation of a Windows 2000 system. Steps are organized into those phases and each step's description includes some information about the problem the step is intended to solve, the actions that need to be taken, tips on how to take the action if it is not obvious, and caveats where they add value. Where actions are more appropriate for organizations with extremely critical security requirements, they are noted with the word "Advanced." The primary focus is on servers, connected in networks, with or without domain services, though some recommendations affect workstations, as well.
(HTML tags aren't allowed.)

Network+ Certification Study Guide, Third Edition
Network+ Certification Study Guide, Third Edition
This book’s primary objective is to help you prepare for and pass the required Network+ exam so you can begin to reap the career benefi ts of certifi cation. We believe that the only way to do this is to help you increase your knowledge and build your skills. After completing this book, you should feel confi dent that you have thoroughly...
The Inner Game of Stress: Outsmart Life's Challenges and Fulfill Your Potential
The Inner Game of Stress: Outsmart Life's Challenges and Fulfill Your Potential

Renowned sports psychology expert W. Timothy Gallwey teams up with two esteemed physicians to offer a unique and empowering guide to mental health in today’s volatile world. The Inner Game of Stress applies the trusted principles of Gallwey’s wildly popular Inner Game series, which have helped athletes the world over, to...

IT Security Risk Control Management: An Audit Preparation Plan
IT Security Risk Control Management: An Audit Preparation Plan

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...


Logic and the Modalities in the Twentieth Century, Volume 7 (Handbook of the History of Logic)
Logic and the Modalities in the Twentieth Century, Volume 7 (Handbook of the History of Logic)

Logic and the Modalities in the Twentieth Century is an indispensable research tool for anyone interested in the development of logic, including researchers, graduate and senior undergraduate students in logic, history of logic, mathematics, history of mathematics, computer science and artificial intelligence, linguistics, cognitive science,...

Ecosystem Responses to Mercury Contamination: Indicators of Change
Ecosystem Responses to Mercury Contamination: Indicators of Change

As rising levels of mercury in the environment pose an increasing threat of toxicity to humans and wildlife, several laws already call for industries to reduce mercury emissions at the source. Ecosystem Responses to Mercury Contamination: Indicators of Change outlines the infrastructure and methods needed to measure, monitor, and regulate the...

Java Performance
Java Performance
Today, Java is used at the heart of the world’s largest and most critical computing systems. However, when I joined the Java team in 1997 the platform was young and just gaining popularity. People loved the simplicity of the language, the portability of bytecodes, and the safety of garbage collection (versus traditional...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy