Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Server 2003 Security : A Technical Reference

Buy

This book is not designed with the Windows end user, advanced or not, in mind. It is meant for the server administrator, network administrator, security administrator, IT manager, technology specialist, or other individual who must design, implement, troubleshoot, or configure the security of Windows Server 2003 or the networks it is used on.

Although it does provide the details that may help anyone studying for an exam, it is not a resource for those whose only interest is passing an exam. There are no study questions and way too much information on topics that may not be on an exam but that are vital to the understanding and operation of server and network security.

This book does provide important information and the details of securing Windows Server 2003; however, it is not a step-by-step guide on how to harden the server. Instead, it is a technical resource, and it provides much of the rationale behind hardening steps.

If you do not use Windows and don't believe it has a place in your network, why are you reading this? I do believe that if you read this book, you may find that Windows Server 2003 does have a place in your network. However, I must warn you—you need to consider the next statement.

If you have no experience or knowledge of Windows, you will need a companion book that concentrates on the technology, a server you can explore on your own, or a willingness to research basic Windows and basic Windows networking on your own. Before you begin studying the more advanced topics, such as securing Active Directory or utilizing Windows Server 2003 resources to provide network security, you will need some understanding of Active Directory. This book assumes that you are not new to Active Directory.

If you are an expert on Windows Server 2003 security, you may learn something new here.

If you are, like most technical Windows users, solidly savvy in some security areas but lacking information in others, I believe you'll be able to find the information you need to become well rounded within these pages.

If you are a programmer, this book can do much to help you understand how Windows server security works and how its security technologies are used on a network. It should not, however, be your source for the intimate details you need if you must program security or program securely. The technical details you need are primarily provided in the Software Development Kit (SDK) available from Microsoft. The sound security knowledge and necessary programming skill are functions of training and experience. I would especially caution you that the algorithms provided within this book to help readers understand how technology works do not provide enough information for you to produce code that can correctly implement the technology. Programming security technologies is especially difficult to get right and is not a subject addressed by this book.

(HTML tags aren't allowed.)

Practical RichFaces (Expert's Voice in Java Technology)
Practical RichFaces (Expert's Voice in Java Technology)

RichFaces 4 is a component library for JavaServer Faces, and an advanced framework for easily integrating AJAX capabilities into business applications. It lets you quickly develop next-generation web applications based on JSF 2/Ajax.

In this definitive RichFaces 4 book, instead of using JBoss Tools, the author bases all...

The RF in RFID: Passive UHF RFID in Practice
The RF in RFID: Passive UHF RFID in Practice
This book includes a survey of all RFID fundamentals and practices in the first part of the book while the second part focuses on UHF passive technology. This coverage of UHF technology and its components including tags, readers, and antennas is essential to commercial implementation in supply chain logistics and security.

Reaaders of
...
iPod & iTunes VISUAL Quick Tips
iPod & iTunes VISUAL Quick Tips
Would you like to discover the best ways to find cool stuff on iTunes, download it all to your iPod, and get the very most out of both these hot technologies from Apple? Then this Visual Quick Tips book is for you. This book will increase your productivity by providing you with shortcuts, tricks, and tips to help you work smarter and faster.

...


Sultry, Sweet or Sassy: The Professional Photographer's Guide to Boudoir Photography Techniques
Sultry, Sweet or Sassy: The Professional Photographer's Guide to Boudoir Photography Techniques
Whether you’re looking to enter the boudoir photography market or to take your existing boudoir photography business to the next level, acclaimed photographer and photo-educator Kay Eskridge has the information you need. In this comprehensive book, Eskridge shows you how to develop a unique boudoir division for your business, then craft a...
Land, Conflict, and Justice: A Political Theory of Territory
Land, Conflict, and Justice: A Political Theory of Territory
'Avery Kolers has written a terrific book on the idea of land and territory in political disputes. This is an incredibly important subject that has been largely ignored in political philosophy and legal theory. Kolers' book is the best writing of its kind: plausibly argued, lucidly written, and richly informed with empirical material. I learned an...
Semantic Web for the Wo Ontologist: Effective Modeling in RDFS and OWL
Semantic Web for the Wo Ontologist: Effective Modeling in RDFS and OWL
The promise of the Semantic Web to provide a universal medium to exchange data information and knowledge has been well publicized. There are many sources too for basic information on the extensions to the WWW that permit content to be expressed in natural language yet used by software agents to easily find, share and integrate information. Until...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy