Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Professional Windows Desktop and Server Hardening (Programmer to Programmer)

Buy

Although not well known, Microsoft Windows has the best security of any popular operating system in the world today. What Windows has is poor default security. There are specific steps any professional can take to significantly increase the security of Microsoft Windows. Unfortunately, most books and the news media keep reinforcing the failed, traditional recommendations of firewalls, antivirus scanners, and end user education. Those defenses have failed and will always fail. The reason why the traditional advice fails is that most defenses and courses concentrate on defending PCs against the motivated hacker, when 99 of the attacks (and 100 of the popular attacks) are caused by malicious viruses, worms, and trojans. Defending against these mobile threats calls for specific tasks that when implemented, defeat most threats, no matter the brand of firewall or virus scanner you've purchased. Better, yet, most of the good defenses are free, included with Windows (just not implemented correctly).

This book:

  • Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products
  • Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security
  • As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years

About the Author

Roger A. Grimes (CPA, CISSP, MCSE: Security, MVP, CEH, CHFI, TICSA) is a 20-year computer security consultant, writer, and teacher. He has written over a 150 national magazine articles on computer security, and this is his fifth book on Microsoft Windows security. He has consulted for many of the world's best-known enterprises (including McAfee, Microsoft, Verisign, and IBM), multiple universities, cities and school systems, plus every branch of the U.S. armed forces. He is currently a highly rated instructor teaching Windows and Linux security in Foundstone's Ultimate Hacking classes. He has presented at many of the industry's largest conferences, including MCP TechMentor, Windows Connections, and SANS. He was a contributing editor for Windows IT Pro magazine, and is the security columnist for InfoWorld magazine. He has written several advanced security courses, including for Microsoft. He is a three-year recipient of Microsoft's Most Valuable Professional (MVP) award.

(HTML tags aren't allowed.)

Stochastic Modeling and Analysis of Telecoms Networks
Stochastic Modeling and Analysis of Telecoms Networks

This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.
The authors propose a
...

Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series)
Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series)
Parameterized complexity theory is a recent branch of computational complexity theory that provides a framework for a refined analysis of hard algorithmic problems. The central notion of the theory, fixed-parameter tractability, has led to the development of various new algorithmic techniques and a whole new theory of intractability. This book is a...
The Art & Science of Interpreting Market Research Evidence
The Art & Science of Interpreting Market Research Evidence
This book is supported by a ten-module training course consisting of a series of PowerPoint presentation charts. This also includes case studies that will be helpful to University lecturers and those responsibl e for training new graduates entering the mark et research industry, on either the client or agency side.

"This is modern...


Gaming for Classroom-Based Learning: Digital Role Playing as a Motivator of Study (Premier Reference Source)
Gaming for Classroom-Based Learning: Digital Role Playing as a Motivator of Study (Premier Reference Source)

In order to effectively use games in the classroom, teachers and parents need to agree on games positive functions toward students learning, decide and select good educational games relevant to content and tasks in the classroom, and disseminate their acquired knowledge into the teaching field.

As part of an international dialogue...

Recommender Systems for the Social Web (Intelligent Systems Reference Library, Vol. 32)
Recommender Systems for the Social Web (Intelligent Systems Reference Library, Vol. 32)
The emergence and deployment of new digital communication technologies (3G mobile networks, digital television, xDSL, home automation networks, etc.) has led to a gradual increase in speed while a steady decline in prices at Internet connections. Moreover, since much longer ago, the continuing advances in electronic technology...
Health Monitoring of Bridges
Health Monitoring of Bridges
Health Monitoring of Bridges prepares the bridge engineering community for the exciting new technological developments happening in the industry, offering the benefit of much research carried out in the aerospace and other industrial sectors and discussing the latest methodologies available for the management of bridge stock.

...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy