000 | 01845cam a22002414a 4500 | ||
---|---|---|---|
020 | _a0764599909 (paper/website) | ||
020 | _a9780764599903 (paper/website) | ||
082 | 0 | 0 |
_a005.8 _bGRI |
100 | 1 | _aGrimes, Roger A. | |
245 | 1 | 0 | _aProfessional Windows desktop and server hardening |
260 |
_aIndianapolis, IN : _bWiley, _cc2006. |
||
300 |
_axxvi, 572 p. : _bill. ; |
||
500 | _a"Programmer to programmer"--Cover. | ||
500 | _aIncludes index. | ||
505 | _aAcknowledgments. Introduction. Part I: The Basics in Depth. Chapter 1: Windows Attacks. Chapter 2: Conventional and Unconventional Defenses. Chapter 3: NTFS Permissions 101. Part II: OS Hardening. Chapter 4: Preventing Password Crackers. Chapter 5: Protecting High-Risk Files. Chapter 6: Protecting High-Risk Registry Entries. Chapter 7: Tightening Services. Chapter 8: Using IPSec. Part III: Application Security. Chapter 9: Stopping Unauthorized Execution. Chapter 10: Securing Internet Explorer. Chapter 11: Protecting E-mail. Chapter 12: IIS Security. Chapter 13: Using Encrypting File System. Part IV: Automating Security. Chapter 14: Group Policy Explained. Chapter 15: Designing a Secure Active Directory Infrastructure. Book Summary. | ||
520 | _aToday's uber viruses, worms, and trojans may seem more damaging than ever, but the attacking malware and malicious hackers are using the same tricks they always have. With this book, Microsoft MVP Roger Grimes exposes the real threat to Windows computers and offers practical guidance to secure those systems | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aComputer networks | |
856 | 4 | 1 | _uhttp://www.loc.gov/catdir/toc/ecip067/2006003777.html |
856 | 4 | 2 | _uhttp://www.loc.gov/catdir/enhancements/fy0629/2006003777-d.html |
856 | 4 | 2 | _uhttp://www.loc.gov/catdir/enhancements/fy0740/2006003777-b.html |
942 | _cBK | ||
999 |
_c13101 _d13101 |