Warenkorb
Kostenloser Versand
Unsere Operationen sind klimaneutral

Windows NT Security Guide Stephen A. Sutton

Windows NT Security Guide von Stephen A. Sutton

Windows NT Security Guide Stephen A. Sutton


€12.49
Zustand - Sehr Gut
Nur noch 1

Zusammenfassung

A guide that introduces administrators to the security features found in Windows NT and shows how to integrate them into their networked environment. This text addresses real-world questions and common threats such as, data snooping, password misuse and viruses.

Windows NT Security Guide Zusammenfassung

Windows NT Security Guide Stephen A. Sutton

"I will recommend Steve's new book to our customers. Steve's knowledge of operating systems security and government security requirements give him a deep understanding of how to utilize Windows NT in a secure manner." Curt Kolcun Systems Engineering Manager Microsoft "I found Windows NT Security Guide to be a true gem...it's not just a good book on security, it is instructional by design." Christopher Brown San Diego Windows NT User Group A Survival Guide for Safeguarding Your Windows NT System and Its Networks! Your computers are at risk, whether they are connected to a corporate intranet or the Internet, have access to a sensitive database, or simply sit on your desk when you're not there. In the Windows NT Security Guide, Steve Sutton, a security expert and corporate trainer, shows you how to maximize Windows NT's various security protections and avoid many of its pitfalls. This book explains NT's security features from a step-by-step, how-to perspective with numerous realistic examples. Whether you are a day-to-day user or network administrator, you'll find Windows NT Security Guide an invaluable reference.Windows NT Security Guide helps you: *Spot and protect against common threats, such as data snooping and tampering, password misuse, and viruses *Configure Windows NT against Internet and intranet security risks *Build your Security Policy for user accounts and groups, domains, Access Control Lists, and the security log *Understand the basics of cryptography that play large roles in today's global Internet environment *Use some of NT's lesser-known secure installation practices and cope with its inherent security soft spots *Answer the basic question: Is Windows NT secure enough for me? This book is accompanied by a complete set of on-line exercises and many "pencil" questions (and answers) so that you can also use it as a self-paced training tool. 0201419696B04062001

Über Stephen A. Sutton

Steve Sutton is the founder of Trusted Systems Services, Inc., a computer-security consulting- and training company formed in 1986. He has been a prominent designer and teacher of secure operating systems and standards for almost two decades.

0201419696AB04062001

Inhaltsverzeichnis

I. GENERAL USE.

1. Introduction.

In This Chapter We Describe.

Windows NT and Security.

Trust, Threats, and the TCB.

About This Book.

Prerequisites.

Icons, Conventions, and Typography.

2. Accounts and Domains.

In This Chapter We Describe.

Domains and Workstations.

Accounts and the Logon Session.

Summary.

3. Your Working Environment.

In This Chapter We Describe.

The Trusted Path.

Choosing Passwords.

Other Topics.

Summary.

4. ACLs.

In This Chapter We Describe.

Introduction.

Groups.

Basic ACLs for Files.

The Access Decision.

Basic ACLs for Directories.

ACL Propagation: Protecting Trees.

Assorted ACL Topics.

Summary.

5. Special Situations.

Local Accounts and Matching.

In This Section We Describe.

Using the Remote Access Service.

Windows 95.

Windows for Workgroups.

II. ADMINISTRATION.

6. Planning Domains.

In This Chapter We Describe.

What Is Security "Administration"?.

Planning Domains.

Summary.

7. Managing Groups and Accounts.

In This Chapter We Describe.

User Groups.

Accounts.

The Rights Policy.

Administrative Access.

8. Security Auditing.

In This Chapter We Describe.

The Mechanics of Auditing.

Common Auditing Scenarios.

Working with the Security Log.

Deciding What to Audit.

Summary.

9. The Internet and Intranets.

In This Chapter We Describe.

Windows NT and Intranets.

Cryptography.

Internet Information Server.

Other Networking Topics.

10. Subsystems and Other Security Features.

In This Chapter We Describe.

NT Registry.

System Policy Editor.

Printers.

Administering Windows 95.

Administering WFW.

Other Topics.

11. The TCB.

In This Chapter We Describe.

What Constitutes the TCB?

Protecting the TCB.

Summary.

12. Summary and Checklist.

General User Education.

Domain Model and Network Administration.

Groups.

General Access to Workstations.

Accounts.

Security Auditing.

The TCB.

General.

Networking.

13. NT Security Discussion.

The TCSEC.

Windows NT and the TCSEC.

Networking.

NT Security Feature by Feature.

Third-Party Watch.

Appendix A: Secure Installation.

The Registry.

File System ACLs.

Rights Policy.

Troubleshooting.

Miscellaneous.

Appendix B: Glossary.
Appendix C: Answers.
Index.

Zusätzliche Informationen

GOR005637327
9780201419696
0201419696
Windows NT Security Guide Stephen A. Sutton
Gebraucht - Sehr Gut
Broschiert
Pearson Education (US)
1996-12-23
384
N/A
Die Abbildung des Buches dient nur Illustrationszwecken, die tatsächliche Bindung, das Cover und die Auflage können sich davon unterscheiden.
Dies ist ein gebrauchtes Buch. Es wurde schon einmal gelesen und weist von der früheren Nutzung Gebrauchsspuren auf. Wir gehen davon aus, dass es im Großen und Ganzen in einem sehr guten Zustand ist. Sollten Sie jedoch nicht vollständig zufrieden sein, setzen Sie sich bitte mit uns in Verbindung.