Skip to content

Securing Windows Server 2003 Hands-On Advice for Securing and Implementing Windows Server 2003

Best in textbook rentals since 2012!

ISBN-10: 0596006853

ISBN-13: 9780596006853

Edition: 2004

Authors: Mike Danseglio

List price: $39.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

With the success of computer viruses like Slammer, security issues are now a top priority for Windows system administrators, right alongside day-to-day tasks such as setting up accounts and managing performance. If you use Windows 2003 Server at a small to medium-sized organization, or use Microsoft's Small Business Server, this thorough yet concise tutorial offers the hands-on advice you need for securing your network. Modern network operating systems include bundled services that range from traditional file and print sharing and Internet services to authentication, directory and remote access services each a potential security vulnerability as well as a capability. "Securing Windows…    
Customers also bought

Book details

List price: $39.95
Copyright year: 2004
Publisher: O'Reilly Media, Incorporated
Publication date: 12/21/2004
Binding: Paperback
Pages: 444
Size: 7.00" wide x 9.19" long x 1.13" tall
Weight: 1.584
Language: English

Mike Danseglio is an author of several books and numerous articles and papers, mostly on various aspects of information security, virtualization, cloud computing, and IT management. He is also an experienced public speaker, having delivered lectures to audiences of up to 2,200 in person and through the Internet. Avri Salter, Ph.D., has over 20 years of experience in the wireless communications and IT industries. She is known as one of the world's leading experts in implementing wireless technologies and mobile cloud services. Dr. Salter has worked on many leading edge wireless and IT technologies. She has deployed IT solutions for the financial, manufacturing and retail industries. She was…    

Preface
Introduction to Windows Server 2003 Security
What Is Security?
What Is Windows Server 2003?
Security Design in Windows Server 2003
Security Features in the Windows Server 2003 Family
Basics of Computer Security
Why Computer Security Is Important
Security Enforcement Mechanisms
POLA: The Principle of Least Access
Key-Based Cryptography
Authorization and Authentication
Password Basics
Network Security
Keeping Your Eyes Open
Physical Security
Identifying Physical Security Vulnerabilities
Protecting Physical Assets
Holistic Security: Best Practices
File System Security
Protecting Files with NTFS File Permissions
Protecting Data with the Encrypting File System
Protecting System Information with Syskey
Group Policy and Security Templates
What Is Group Policy?
How Group Policy Works
How Do Security Templates Work?
Using Group Policy to Enforce Security
Using Security Templates to Deploy Secure Configurations
Running Secure Code
Identifying Secure Code
Driver Signing
Software Restriction Policies
Authentication
LAN Manager and NTLM
Kerberos
IP Security
What Is IP Security?
How Does IPSec Work?
Microsoft's Implementation of IPSec in Windows Server 2003
Using IPSec Correctly
Certificates and Public Key Infrastructure
What Are Certificates?
What Do I Do with Certificates?
What Is a Certification Authority?
Deciding Between Public and Private Certification Authorities
Implementing a Public PKI
Planning Your Private Certification Hierarchy
Implementing a Private Certification Hierarchy
Maintaining Your Hierarchy
Smart Card Technology
What Are Smart Cards?
Using Smart Cards
DHCP and DNS Security
DHCP
DNS
DNS and DHCP Together
Internet Information Services Security
What Is IIS?
How Does IIS Work?
Using IIS Securely
Active Directory Security
What Is Active Directory?
Structural Components of Active Directory
Domain Controllers
Default Security Through GPOs
Providing Security for Domains
Providing Security for Forests
Providing Security for Active Directory Objects
Providing Security for Domain Controllers
Remote Access Security
What Is Remote Access?
Controlling Access
Authentication and Encryption Protocols
Virtual Private Networks
Example Implementations for Remote Access
Auditing and Ongoing Security
Security Policies and Procedures
Auditing
Operating System Updates
Sending Secure Email
Index