
Securing Windows NT/2000
From Policies to Firewalls
Résumé
In today's business environment it is no longer safe to
conduct any business on the Internet without first
protecting it. Small, medium, and large corporations
require a massive dose of security to protect themselves
and their digital assets from unwanted intruders. A
managerial guide and practical technical tutorial, Securing
Windows NT/2000: From Policies to Firewalls provides viable
security solutions for your organization.
The author presents in-depth knowledge on how, why, and
where these operating systems must be tuned in order to use
them securely to connect to the Internet. The book includes
the steps required to define a corporate security policy,
how to implement that policy, and how to structure the
project plan. Tables, charts, and work templates provide a
starting point to begin assessing and implementing a
solution that will fit the unique needs of your
organization. Part two provides the reader with practical
hands-on applications for the preparation, installation,
and tuning of Windows NT/2000 operating systems. Securing
Windows NT/2000 provides step-by-step instructions that
guide you through performing a secure installation and in
preparing the system for secure operation on the
Internet.
Although a multitude of firewall application software can
be used in conjunction with the sections detailing the
securing of the operating system, Check Point
FireWall-1/VPN-1 is used as it best demonstrates the
effectiveness of translating the corporate security policy
into a practical reality.About the Author:Michael Simonyi
(www.stonewallem.com) is an IT professional working for
private sector enterprise organizations. He has over 12
years of practical and theoreticalexperience, from
mainframe systems to PC client/server networks. His areas
of expertise center on practical systems management,
networking, databases, and application architecture, with
emphasis on quality.
- Executive Management Overview
- What is Security?
- What is a Security Policy?
- Implementing the Security Policy
- Perimeter Security Scenarios
- Directions in Security
- Corporate Security Requirements for Conducting Business over the Internet
- Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000
- Enhancing the Security Infrastructure
- Appendices
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Auerbach |
Auteur(s) | Michael A. Simonyi |
Parution | 29/11/2002 |
Nb. de pages | 262 |
Format | 18 x 25,5 |
Couverture | Broché |
Poids | 580g |
Intérieur | Noir et Blanc |
EAN13 | 9780849312618 |
ISBN13 | 978-0-8493-1261-8 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse