Document Type
|
:
|
BL
|
Record Number
|
:
|
1002315
|
Doc. No
|
:
|
b756685
|
Main Entry
|
:
|
Gupta, Rashi,1977-
|
Title & Author
|
:
|
Microsoft Windows 2000 security /\ Rashi Gupta with NIIT.
|
Publication Statement
|
:
|
Cincinnati, Ohio :: Premier Press,, ©2003.
|
Page. NO
|
:
|
1 online resource (xx, 508 pages) :: illustrations
|
ISBN
|
:
|
0585456062
|
|
:
|
: 1931841861
|
|
:
|
: 9780585456065
|
|
:
|
: 9781931841863
|
Notes
|
:
|
Includes index.
|
Contents
|
:
|
""Contents""; ""Introduction""; ""PART I: WINDOWS 2000 SECURITY� AN OVERVIEW""; ""Chapter 1 Need for Security""; ""What Is at Risk?""; ""Purpose of Security""; ""Types of Attackers""; ""Security Threats""; ""Windows 2000 Core Security Features�A Primer""; ""Windows 2000 Security Model""; ""Summary""; ""Check Your Understanding""; ""Chapter 2 Introducing Windows 2000 Security""; ""Active Directory""; ""Authentication""; ""Accessing Network Resources""; ""Configuration Management""; ""Data Encryption""; ""Public Key Infrastructure""; ""Summary""
|
|
:
|
""Chapter 9 Internet Information Server (IIS)""""IIS: An Overview""; ""IIS Authentication""; ""Access Control""; ""Summary""; ""Check Your Understanding""; ""Chapter 10 Remote Access and VPN""; ""Remote Access Services""; ""Virtual Private Networking""; ""IAS""; ""Summary""; ""Check Your Understanding""; ""PART IV: OTHER SECURITY FEATURES""; ""Chapter 11 Reliability Features of Windows 2000""; ""Diagnostic Tools""; ""Windows File Protection Feature""; ""Fault Tolerance""; ""Backup""; ""System Recovery""; ""Summary""; ""Check Your Understanding""; ""Chapter 12 Securing Non-Microsoft Clients""
|
|
:
|
""Group Policy Processing""""Using Group Policy Tools""; ""Windows 2000 Security Templates�An Overview""; ""Summary""; ""Check Your Understanding""; ""PART III: NETWORK SECURITY""; ""Chapter 6 Public Key Infrastructure""; ""What Is Public Key Cryptography?""; ""Windows 2000 PKI""; ""Summary""; ""Check Your Understanding""; ""Chapter 7 Network Services""; ""DNS: An Overview""; ""DHCP: An Overview""; ""SNMP""; ""RIS""; ""Terminal Services""; ""Summary""; ""Check Your Understanding""; ""Chapter 8 Internet Security""; ""IPSec""; ""Firewalls""; ""Summary""; ""Check Your Understanding""
|
|
:
|
""PART II: AN INSIGHT INTO WINDOWS 2000 SECURITY FEATURES""""Chapter 3 Authentication""; ""Introduction to Authentication""; ""Kerberos V5 Authentication Protocol""; ""Security Support Provider""; ""Other Authentication Protocols""; ""Summary""; ""Check Your Understanding""; ""Chapter 4 Authorization and Access Control""; ""An Overview of Windows 2000 Access Control""; ""Configuring Access Control Permissions""; ""Encryption File System""; ""Securing the Print Resource""; ""Summary""; ""Check Your Understanding""; ""Chapter 5 Security Policies""; ""Group Policy�An Overview""
|
|
:
|
""Securing Access to UNIX Clients""""Securing Access with NetWare""; ""Securing Access with Macintosh Clients""; ""Summary""; ""Check Your Understanding""; ""PART V: APPENDIXES""; ""Appendix A: Best Practices""; ""Auditing""; ""Securing CAs""; ""EFS""; ""Security Configuration and Analysis""; ""Security Templates""; ""Acess Control""; ""Active Directory""; ""Group Policy""; ""Software Installation and Management""; ""Folder Redirection""; ""Distributed File System (Dfs)""; ""Network and Dial-up Connections""; ""TCP/IP Protocol""; ""DNS""; ""Server Best Practices""; ""DHCP""
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
COMPUTERS-- Internet-- Security.
|
Subject
|
:
|
COMPUTERS-- Networking-- Security.
|
Subject
|
:
|
COMPUTERS-- Security-- General.
|
Subject
|
:
|
Microsoft Windows (Computer file)
|
|
:
|
Microsoft Windows (Computer file)
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
QA76.9.A25G87 2003eb
|
Added Entry
|
:
|
NIIT (Corporation)
|