Windows .NET Server Security Handbook
Step-by-step techniques and fast answers !
Résumé
- The practical, start-to-finish guide to Windows .NET security
- New Windows .NET security features: Location-Aware Firewalling, Offline File Encryption, and more
- Locking down .NET servers and XP clients-step by step
- Securing new Windows .NET features: Raw Sockets, Remote Desktop, Remote Assistance, and more
- Anticipating future threats-including threats to 802.1x wireless networks
- The Internet Connection Firewall: configuration, adding programs, logging, ICMP, and more
- Windows .NET raw sockets: the reality-and what you should do about it
- Anticipating emerging threats, including wireless 802.11 hacking and "War Driving"
- Windows .NET Security Toolset: using the Security Configuration and Analysis snap-in, Secedit.exe, Security Templates, and more
- Configuring Windows .NET VPNs, PKI, and Smart Cards
- Kerberos: server authentication, policies, security environments, and interoperability issues
- Securing Microsoft IIS Web services in Windows .NET environments
- Understanding the core security architecture Microsoft's .NET platform is built upon
- Discovering new security holes fast: how you can beat BugTraq by seven days!
About the CD-ROM
Powerful library of Windows .NET security tools!- VirusMD Personal Firewall 3.0: diagnose and treat Trojan horse infections
- eEye RetinaTM network security scanner (demo): scan your network for vulnerabilities
- eEye SecureIIS application firewall (demo): Maximize app-layer security
- eEye IrisTM sniffer (demo): Perform advanced protocol analysis
- LC3 password testing: Audit NT/Win2K user passwords
- MIRC, MultiProxy, and Socks2HTTP: perform anonymous counterintelligence against hackers
- NetStumbler wireless security tester: scan wireless networks for security flaws
Contents
- 1.What's Different in Windows .NET Security.
- 2. Securing Windows .NET Remote Administration.
- 3. Securing Remote Assistance.
- 4. Windows .NET Client Security: Protecting Windows XP.
- 5. Frequently Asked Questions.
- 6. Wireless Security.
- 7. Configuring Windows .NET Server Security.
- 8. Encrypting File System.
- 9. Public Key Infrastructure.
- 10. Smart Cards.
- 11. Designing Secure Virtual Private Networks (VPN).
- 12. Security Configuration Tool Set.
- 13. Configuring Windows .NET Internet Security.
- 14. Configuring IP Security.
- 15. How to Beat Bugtraq by Seven Days.
L'auteur - Cyrus Peikari
DR. CYRUS PEIKARI has served as Chief Technical Officer for VirusMD Corporation since 1998. Dr. Peikari is a physician in Dallas, TX who personally has several patents pending in the computer virus field. He has also spoken at Defcon, the annual hacker security conference in Las Vegas, NV.
L'auteur - Seth Fogie
SETH FOGIE is currently Senior Security Consultant at VirusMD Corporation, where he moderates the firm's Internet Security Help forum. He served six years as a U.S. Navy Nuclear Engineer and earned his MCSE before becoming the Network Administrator for a large retail company.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Prentice Hall |
Auteur(s) | Cyrus Peikari, Seth Fogie |
Parution | 21/05/2002 |
Nb. de pages | 332 |
Format | 18,5 x 23,5 |
Couverture | Broché |
Poids | 726g |
Intérieur | Noir et Blanc |
EAN13 | 9780130477262 |
ISBN13 | 978-0-13-047726-2 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse