Skip to content

Professional Windows Desktop and Server Hardening

Best in textbook rentals since 2012!

ISBN-10: 0764599909

ISBN-13: 9780764599903

Edition: 2006

Authors: Roger A. Grimes

List price: $50.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book
Customers also bought

Book details

List price: $50.00
Copyright year: 2006
Publisher: John Wiley & Sons, Incorporated
Publication date: 5/1/2006
Binding: Paperback
Pages: 608
Size: 7.42" wide x 9.21" long x 1.40" tall
Weight: 1.848
Language: English

Roger A. Grimes (CPA, CISSP, CEH, MCSE: Security) is a 19-year Windows security veteran with 6 books and over 150 national magazine articles on the subject. Roger is a 3-time Microsoft MVP in Windows Security (and MVP of the Month in December 2005). He participated in the Microsoft Windows Server 2003 Learning curriculum and was an Early Achiever of theWindows Server 2003 MSCE: Security desination. Roger has written advanced Windows security courses for Microsoft, Foundstone, and SANS.

Acknowledgments
Introduction
The Basics in Depth
Windows Attacks
Conventional and Unconventional Defenses
NTFS Permissions 101
OS Hardening
Preventing Password Crackers
Protecting High-Risk Files
Protecting High-Risk Registry Entries
Tightening Services
Using IPSec
Application Security
Stopping Unauthorized Execution
Securing Internet Explorer
Protecting E-mail
IIS Security
Using Encrypting File System
Automating Security
Group Policy Explained
Designing a Secure Active Directory Infrastructure
Book Summary
Index