رکورد قبلیرکورد بعدی

" Microsoft Windows 2000 security / "


Document Type : BL
Record Number : 1002315
Doc. No : b756685
Main Entry : Gupta, Rashi,1977-
Title & Author : Microsoft Windows 2000 security /\ Rashi Gupta with NIIT.
Publication Statement : Cincinnati, Ohio :: Premier Press,, ©2003.
Page. NO : 1 online resource (xx, 508 pages) :: illustrations
ISBN : 0585456062
: : 1931841861
: : 9780585456065
: : 9781931841863
Notes : Includes index.
Contents : ""Contents""; ""Introduction""; ""PART I: WINDOWS 2000 SECURITY� AN OVERVIEW""; ""Chapter 1 Need for Security""; ""What Is at Risk?""; ""Purpose of Security""; ""Types of Attackers""; ""Security Threats""; ""Windows 2000 Core Security Features�A Primer""; ""Windows 2000 Security Model""; ""Summary""; ""Check Your Understanding""; ""Chapter 2 Introducing Windows 2000 Security""; ""Active Directory""; ""Authentication""; ""Accessing Network Resources""; ""Configuration Management""; ""Data Encryption""; ""Public Key Infrastructure""; ""Summary""
: ""Chapter 9 Internet Information Server (IIS)""""IIS: An Overview""; ""IIS Authentication""; ""Access Control""; ""Summary""; ""Check Your Understanding""; ""Chapter 10 Remote Access and VPN""; ""Remote Access Services""; ""Virtual Private Networking""; ""IAS""; ""Summary""; ""Check Your Understanding""; ""PART IV: OTHER SECURITY FEATURES""; ""Chapter 11 Reliability Features of Windows 2000""; ""Diagnostic Tools""; ""Windows File Protection Feature""; ""Fault Tolerance""; ""Backup""; ""System Recovery""; ""Summary""; ""Check Your Understanding""; ""Chapter 12 Securing Non-Microsoft Clients""
: ""Group Policy Processing""""Using Group Policy Tools""; ""Windows 2000 Security Templates�An Overview""; ""Summary""; ""Check Your Understanding""; ""PART III: NETWORK SECURITY""; ""Chapter 6 Public Key Infrastructure""; ""What Is Public Key Cryptography?""; ""Windows 2000 PKI""; ""Summary""; ""Check Your Understanding""; ""Chapter 7 Network Services""; ""DNS: An Overview""; ""DHCP: An Overview""; ""SNMP""; ""RIS""; ""Terminal Services""; ""Summary""; ""Check Your Understanding""; ""Chapter 8 Internet Security""; ""IPSec""; ""Firewalls""; ""Summary""; ""Check Your Understanding""
: ""PART II: AN INSIGHT INTO WINDOWS 2000 SECURITY FEATURES""""Chapter 3 Authentication""; ""Introduction to Authentication""; ""Kerberos V5 Authentication Protocol""; ""Security Support Provider""; ""Other Authentication Protocols""; ""Summary""; ""Check Your Understanding""; ""Chapter 4 Authorization and Access Control""; ""An Overview of Windows 2000 Access Control""; ""Configuring Access Control Permissions""; ""Encryption File System""; ""Securing the Print Resource""; ""Summary""; ""Check Your Understanding""; ""Chapter 5 Security Policies""; ""Group Policy�An Overview""
: ""Securing Access to UNIX Clients""""Securing Access with NetWare""; ""Securing Access with Macintosh Clients""; ""Summary""; ""Check Your Understanding""; ""PART V: APPENDIXES""; ""Appendix A: Best Practices""; ""Auditing""; ""Securing CAs""; ""EFS""; ""Security Configuration and Analysis""; ""Security Templates""; ""Acess Control""; ""Active Directory""; ""Group Policy""; ""Software Installation and Management""; ""Folder Redirection""; ""Distributed File System (Dfs)""; ""Network and Dial-up Connections""; ""TCP/IP Protocol""; ""DNS""; ""Server Best Practices""; ""DHCP""
Subject : Computer security.
Subject : Computer security.
Subject : COMPUTERS-- Internet-- Security.
Subject : COMPUTERS-- Networking-- Security.
Subject : COMPUTERS-- Security-- General.
Subject : Microsoft Windows (Computer file)
: Microsoft Windows (Computer file)
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9.A25‬‭G87 2003eb‬
Added Entry : NIIT (Corporation)
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟