Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hardening Windows, Second Edition

Buy
Hardening Windows, Second Edition, 9781590595398 (1590595394), Apress, 2005

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet money there'll be an attempt soon and should "batten down the hatches" in anticipation.

Hardening Windows, Second Edition is the definitive "counterintelligence" guide to performing preventative security measures for the Windows OS. This second edition covers the release of Windows XP Service Pack 2 and its new security features, including the Windows Firewall and the Security Center. It also covers Windows Server 2003 Service Pack 1, Windows Server R2's new Security Configuration Wizard, Windows NT, Windows 2000, branch-office security features, and new setup options. A new chapter has been added on Windows Software Update Services. All chapters have been updated to reflect reader feedback from the first edition. Topics covered include system and group policies, Network Access Quarantine Control, auditing and event logs, IIS, and Exchange.

Before I begin, let me offer my sincere thanks for purchasing this book! I’m glad you’ve made the decision to spend some time securing and hardening your systems. Not only are you helping yourself, but you’re also protecting the Internet community as a whole.

This book is quick and simple, so it’s best to understand what’s inside before you even begin reading it. For one, the chapters themselves stand alone. You can read them in any order, and the material isn’t cumulative. Of course, you’re welcome to read them all, and cross-references are clearly identified when information in a chapter is discussed in more detail earlier in the book. However, if you choose to begin with Chapter 7, you won’t be missing anything. You also won’t be getting long, theoretical discussions about operating system design, kernel locking, OSI layers, and the like. Instead, you’re getting quick, practical, checklist-style suggestions with a minimum of fluff. This book is meant to be carried under your arm to client workstations, placed on the top of the server rack, or snugly kept right beside your monitor for easy reference. It certainly isn’t a 1,600-page Windows bible.

About the Author
Jonathan Hassell is an author, consultant, and speaker on a variety of IT topics. His published works include RADIUS, Hardening Windows, Using Microsoft Windows Small Business Server 2003, and Learning Windows Server 2003. His work appears regularly in such periodicals as Windows IT Pro, PC Pro, and TechNet Magazine. Jonathan also speaks worldwide on topics ranging from networking and security to Windows administration. He is currently an editor for Apress, which specializes in books for programmers and IT professionals.
(HTML tags aren't allowed.)

A Short History of Financial Euphoria (Penguin Business)
A Short History of Financial Euphoria (Penguin Business)
The world-renowned economist offers "dourly irreverent analyses of financial debacle from the tulip craze of the seventeenth century to the recent plague of junk bonds."—The Atlantic.
 
It is now three years since I did the main work on this small book. As I told in the Foreword to...
Hack This: 24 Incredible Hackerspace Projects from the DIY Movement
Hack This: 24 Incredible Hackerspace Projects from the DIY Movement

Join today’s new revolution in creativity and community: hackerspaces. Stop letting other people build everything for you: Do it yourself. Explore, grab the tools, get hands-on, get dirty…and create things you never imagined you could. Hack This is your glorious, full-color passport to the...

Artificial Intelligence for Maximizing Content Based Image Retrieval (Premier Reference Source)
Artificial Intelligence for Maximizing Content Based Image Retrieval (Premier Reference Source)

The increasing trend of multimedia data use is likely to accelerate creating an urgent need of providing a clear means of capturing, storing, indexing, retrieving, analyzing, and summarizing data through image data.

Artificial Intelligence for Maximizing Content Based Image Retrieval discusses major aspects of content-based...


iPhone and iPad Apps Marketing: Secrets to Selling Your iPhone and iPad Apps (Que Biz-Tech)
iPhone and iPad Apps Marketing: Secrets to Selling Your iPhone and iPad Apps (Que Biz-Tech)

The Easy, Complete, Step-by-Step Guide to Marketing Your iPhone/iPad Apps!

There are huge profits to be made in selling iPhone and iPad apps! But with more than 180,000 + apps now available, just getting your app into the App Store is no longer enough. You need to market it...

Queenpins: Notorious Women Gangsters of The Modern Era
Queenpins: Notorious Women Gangsters of The Modern Era

The cut throat world of organized crime has long been dominated by men, and such macho godfathers and kingpins as Al Capone, John Dillinger, Pablo Escobar and John Gotti have become legendary. Yet, dig deep into the annals of crime and one can find smart, ambitious and ruthless women who have cracked the glass ceiling of the underworld and...

Hilbert-Courant
Hilbert-Courant

If the life of any 20th century mathematician can be said to be a history of mathematics in his time, it is that of David Hilbert. To the enchanted young mathematicians and physicists who flocked to study with him in Goettingen before and between the World Wars, he seemed mathematics personified, the very air around him"scientifically...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy