Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hardening Windows, Second Edition

Buy
Hardening Windows, Second Edition, 9781590595398 (1590595394), Apress, 2005

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet money there'll be an attempt soon and should "batten down the hatches" in anticipation.

Hardening Windows, Second Edition is the definitive "counterintelligence" guide to performing preventative security measures for the Windows OS. This second edition covers the release of Windows XP Service Pack 2 and its new security features, including the Windows Firewall and the Security Center. It also covers Windows Server 2003 Service Pack 1, Windows Server R2's new Security Configuration Wizard, Windows NT, Windows 2000, branch-office security features, and new setup options. A new chapter has been added on Windows Software Update Services. All chapters have been updated to reflect reader feedback from the first edition. Topics covered include system and group policies, Network Access Quarantine Control, auditing and event logs, IIS, and Exchange.

Before I begin, let me offer my sincere thanks for purchasing this book! I’m glad you’ve made the decision to spend some time securing and hardening your systems. Not only are you helping yourself, but you’re also protecting the Internet community as a whole.

This book is quick and simple, so it’s best to understand what’s inside before you even begin reading it. For one, the chapters themselves stand alone. You can read them in any order, and the material isn’t cumulative. Of course, you’re welcome to read them all, and cross-references are clearly identified when information in a chapter is discussed in more detail earlier in the book. However, if you choose to begin with Chapter 7, you won’t be missing anything. You also won’t be getting long, theoretical discussions about operating system design, kernel locking, OSI layers, and the like. Instead, you’re getting quick, practical, checklist-style suggestions with a minimum of fluff. This book is meant to be carried under your arm to client workstations, placed on the top of the server rack, or snugly kept right beside your monitor for easy reference. It certainly isn’t a 1,600-page Windows bible.

About the Author
Jonathan Hassell is an author, consultant, and speaker on a variety of IT topics. His published works include RADIUS, Hardening Windows, Using Microsoft Windows Small Business Server 2003, and Learning Windows Server 2003. His work appears regularly in such periodicals as Windows IT Pro, PC Pro, and TechNet Magazine. Jonathan also speaks worldwide on topics ranging from networking and security to Windows administration. He is currently an editor for Apress, which specializes in books for programmers and IT professionals.
(HTML tags aren't allowed.)

Visual Intelligence: Microsoft Tools and Techniques for Visualizing Data
Visual Intelligence: Microsoft Tools and Techniques for Visualizing Data

Go beyond design concepts and learn to build state-of-the-art visualizations

The visualization experts at Microsoft's Pragmatic Works have created a full-color, step-by-step guide to building specific types of visualizations. The book thoroughly covers the Microsoft toolset for data analysis and visualization, including...

Cisco® BGP-4 Command and Configuration Handbook (CCIE Professional Development)
Cisco® BGP-4 Command and Configuration Handbook (CCIE Professional Development)

As the means by which Internet destinations are communicated between subscribers and service providers, BGP-4 provides a critical function for Internet operations. Whether associated with Internet service providers or enterprise networks that depend heavily on the Internet, a background in BGP-4 is essential. Moving beyond...

Automated Face Analysis: Emerging Technologies and Research
Automated Face Analysis: Emerging Technologies and Research
Since research on face recognition began in the 1960's, the field has rapidly widened to automated face analysis including face detection, facial gesture recognition, and facial expression recognition.

Automated Face Analysis: Emerging Technologies and Research provides theoretical background to understand the overall...


Biomechanical Systems Technology
Biomechanical Systems Technology
Because of rapid developments in computer technology and computational techniques, advances in a wide spectrum of technologies, coupled with cross-disciplinary pursuits between technology and its application to human body processes, the field of biomechanics continues to evolve. Many areas of significant progress include dynamics of musculoskeletal...
The Physics of Dilute Magnetic Alloys
The Physics of Dilute Magnetic Alloys

Available for the first time in English, this classic text by Jun Kondo describes the Kondo effect thoroughly and intuitively. Its clear and concise treatment makes this book of interest to graduate students and researchers in condensed matter physics. The first half of the book describes the rudiments of the theory of metals at a level that...

General Relativity (Graduate Texts in Physics)
General Relativity (Graduate Texts in Physics)

This book provides a completely revised and expanded version of the previous classic edition ‘General Relativity and Relativistic Astrophysics’. In Part I the foundations of general relativity are thoroughly developed, while Part II is devoted to tests of general relativity and many of its applications. Binary pulsars – our...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy