
Résumé
Implement rock-solid security on your Windows 2000
enterprise network with the expert information in this
comprehensive resource. Windows 2000 Security
Handbook shows you, step-by-step, how to locate and
plug security holes and backdoors, authenticate users, and
defend against the latest methods of attack. You'll get
in-depth coverage of the all-new security features in
Windows 2000 - from Active Directory, Kerveros 5, and
smartcards, to IPSec and PKI. Throughout the book, you'll
get advice on how to incorporate sound security practices
into your daily administrative tasks.Plus, you'll get eight
pages of blueprints illustrating the four major factors in
building a scalable, robust, and secure Windows 2000
network with proper Active Directory and DNS structure, as
well as proper Organizational Unit and Group Policy
usage.
- Understand the threats to your Windows 2000 enterprise
network and the appropriate countermeasures
- Understand Windows 2000-based security mechanisms, and
use them to proactively defeat attackers
- Customize administrative control over your Active
Directory with Group Policy, Organizational Units, and
delegation
- Plan and implement countermeasures, such as system
patches, defensive configuration, encryption, and intrusion
detection methods
- Provide application-transparent encryption services for
IP Traffic with IPSec
- Establish secure Active Directory domain components,
including group and user permissions, OUs, and trust
relationships
- Enable strong authentication with Kerberos 5 and
PKI
- Utilize access control lists and the Encrypting File
System to protect access to critical files and
objects
- Build secure firewalls and implement strong
authentication policies on VPNs
- Handle fault tolerance with disk mirroring, disk
striping, replication, and RAID arrays
- 1. TCP is King
- 2. Security Threats
- 3. Countermeasures
- 4. Security Policies and Management
- 5. An Overview of Windows 2000 Security
- 6. Network Protocols and Services in Win2K
- 7. Windows 2000 Security Risks and Solutions
- 8. Active Directory
- 9. Group Policies
- 10. User and Group Security Management
- 11. Logon and Authentication
- 12. File System and Network Share Security
- 13. Auditing
- 14. Firewalls and Proxy Servers
- 15. Microsoft Proxy Server
- 16. Remote Access and Virtual Private Networks
- 17. Client/Workstation Security
- 18. Enterprise-Wide Security
- 19. Securing the Microsoft Internet Information
Server
- 20. Fault Tolerance and Data Protection
- 21. Hardening Windows 2000
- A. Management, Monitoring and Auditing
- B. Internet Security and Acceleration (ISA)
Server
- C. Intrusion Detection Systems
- Index
L'auteur - Tom Sheldon
Tom Sheldon is a certified network engineer with more
than 25 years of experience as a programmer, consultant,
and network administrator. He is the best-selling author of
Windows NT Security Handbook and The Encyclopedia of
Networking.
L'auteur - Philip Cox
Philip Cox, MSCE, is an industry recognized consultant, author, and lecturer. At SystemExperts, he specializes in designing secure enterprise networks or trying to break into them. A featured columnist for USENIX Association Magazine ;login:, he also serves on the editorial board of the SANS NT Digest.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Mc Graw Hill |
Auteur(s) | Tom Sheldon, Philip Cox |
Parution | 01/12/2000 |
Nb. de pages | 738 |
Format | 18,7 x 23,2 |
Couverture | Broché |
Poids | 1300g |
Intérieur | Noir et Blanc |
EAN13 | 9780072124330 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse