Book description
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.
* The Perfect Guide if "System Administrator is NOT your primary job function
* Avoid "time drains" configuring the many different security standards built into Windows 2003
* Secure VPN and Extranet Communications
Table of contents
- Cover
- Front Matter (1/2)
- Front Matter (2/2)
- Contents (1/3)
- Contents (2/3)
- Contents (3/3)
- Chapter 1 Designing a Secure Network Framework (1/8)
- Chapter 1 Designing a Secure Network Framework (2/8)
- Chapter 1 Designing a Secure Network Framework (3/8)
- Chapter 1 Designing a Secure Network Framework (4/8)
- Chapter 1 Designing a Secure Network Framework (5/8)
- Chapter 1 Designing a Secure Network Framework (6/8)
- Chapter 1 Designing a Secure Network Framework (7/8)
- Chapter 1 Designing a Secure Network Framework (8/8)
- Chapter 2 Securing Servers Based on Function. (1/17)
- Chapter 2 Securing Servers Based on Function. (2/17)
- Chapter 2 Securing Servers Based on Function. (3/17)
- Chapter 2 Securing Servers Based on Function. (4/17)
- Chapter 2 Securing Servers Based on Function. (5/17)
- Chapter 2 Securing Servers Based on Function. (6/17)
- Chapter 2 Securing Servers Based on Function. (7/17)
- Chapter 2 Securing Servers Based on Function. (8/17)
- Chapter 2 Securing Servers Based on Function. (9/17)
- Chapter 2 Securing Servers Based on Function. (10/17)
- Chapter 2 Securing Servers Based on Function. (11/17)
- Chapter 2 Securing Servers Based on Function. (12/17)
- Chapter 2 Securing Servers Based on Function. (13/17)
- Chapter 2 Securing Servers Based on Function. (14/17)
- Chapter 2 Securing Servers Based on Function. (15/17)
- Chapter 2 Securing Servers Based on Function. (16/17)
- Chapter 2 Securing Servers Based on Function. (17/17)
- Chapter 3 Designing a Secure Public Key Infrastructure (1/8)
- Chapter 3 Designing a Secure Public Key Infrastructure (2/8)
- Chapter 3 Designing a Secure Public Key Infrastructure (3/8)
- Chapter 3 Designing a Secure Public Key Infrastructure (4/8)
- Chapter 3 Designing a Secure Public Key Infrastructure (5/8)
- Chapter 3 Designing a Secure Public Key Infrastructure (6/8)
- Chapter 3 Designing a Secure Public Key Infrastructure (7/8)
- Chapter 3 Designing a Secure Public Key Infrastructure (8/8)
- Chapter 4 Securing the Network Management Process (1/8)
- Chapter 4 Securing the Network Management Process (2/8)
- Chapter 4 Securing the Network Management Process (3/8)
- Chapter 4 Securing the Network Management Process (4/8)
- Chapter 4 Securing the Network Management Process (5/8)
- Chapter 4 Securing the Network Management Process (6/8)
- Chapter 4 Securing the Network Management Process (7/8)
- Chapter 4 Securing the Network Management Process (8/8)
- Chapter 5 Securing Network Services and Protocols (1/29)
- Chapter 5 Securing Network Services and Protocols (2/29)
- Chapter 5 Securing Network Services and Protocols (3/29)
- Chapter 5 Securing Network Services and Protocols (4/29)
- Chapter 5 Securing Network Services and Protocols (5/29)
- Chapter 5 Securing Network Services and Protocols (6/29)
- Chapter 5 Securing Network Services and Protocols (7/29)
- Chapter 5 Securing Network Services and Protocols (8/29)
- Chapter 5 Securing Network Services and Protocols (9/29)
- Chapter 5 Securing Network Services and Protocols (10/29)
- Chapter 5 Securing Network Services and Protocols (11/29)
- Chapter 5 Securing Network Services and Protocols (12/29)
- Chapter 5 Securing Network Services and Protocols (13/29)
- Chapter 5 Securing Network Services and Protocols (14/29)
- Chapter 5 Securing Network Services and Protocols (15/29)
- Chapter 5 Securing Network Services and Protocols (16/29)
- Chapter 5 Securing Network Services and Protocols (17/29)
- Chapter 5 Securing Network Services and Protocols (18/29)
- Chapter 5 Securing Network Services and Protocols (19/29)
- Chapter 5 Securing Network Services and Protocols (20/29)
- Chapter 5 Securing Network Services and Protocols (21/29)
- Chapter 5 Securing Network Services and Protocols (22/29)
- Chapter 5 Securing Network Services and Protocols (23/29)
- Chapter 5 Securing Network Services and Protocols (24/29)
- Chapter 5 Securing Network Services and Protocols (25/29)
- Chapter 5 Securing Network Services and Protocols (26/29)
- Chapter 5 Securing Network Services and Protocols (27/29)
- Chapter 5 Securing Network Services and Protocols (28/29)
- Chapter 5 Securing Network Services and Protocols (29/29)
- Chapter 6 Securing Internet Information Services (1/11)
- Chapter 6 Securing Internet Information Services (2/11)
- Chapter 6 Securing Internet Information Services (3/11)
- Chapter 6 Securing Internet Information Services (4/11)
- Chapter 6 Securing Internet Information Services (5/11)
- Chapter 6 Securing Internet Information Services (6/11)
- Chapter 6 Securing Internet Information Services (7/11)
- Chapter 6 Securing Internet Information Services (8/11)
- Chapter 6 Securing Internet Information Services (9/11)
- Chapter 6 Securing Internet Information Services (10/11)
- Chapter 6 Securing Internet Information Services (11/11)
- Chapter 7 Securing VPN and Extranet Communications (1/8)
- Chapter 7 Securing VPN and Extranet Communications (2/8)
- Chapter 7 Securing VPN and Extranet Communications (3/8)
- Chapter 7 Securing VPN and Extranet Communications (4/8)
- Chapter 7 Securing VPN and Extranet Communications (5/8)
- Chapter 7 Securing VPN and Extranet Communications (6/8)
- Chapter 7 Securing VPN and Extranet Communications (7/8)
- Chapter 7 Securing VPN and Extranet Communications (8/8)
- Chapter 8 Securing Active Directory . (1/9)
- Chapter 8 Securing Active Directory . (2/9)
- Chapter 8 Securing Active Directory . (3/9)
- Chapter 8 Securing Active Directory . (4/9)
- Chapter 8 Securing Active Directory . (5/9)
- Chapter 8 Securing Active Directory . (6/9)
- Chapter 8 Securing Active Directory . (7/9)
- Chapter 8 Securing Active Directory . (8/9)
- Chapter 8 Securing Active Directory . (9/9)
- Chapter 9 Securing Network Resources (1/21)
- Chapter 9 Securing Network Resources (2/21)
- Chapter 9 Securing Network Resources (3/21)
- Chapter 9 Securing Network Resources (4/21)
- Chapter 9 Securing Network Resources (5/21)
- Chapter 9 Securing Network Resources (6/21)
- Chapter 9 Securing Network Resources (7/21)
- Chapter 9 Securing Network Resources (8/21)
- Chapter 9 Securing Network Resources (9/21)
- Chapter 9 Securing Network Resources (10/21)
- Chapter 9 Securing Network Resources (11/21)
- Chapter 9 Securing Network Resources (12/21)
- Chapter 9 Securing Network Resources (13/21)
- Chapter 9 Securing Network Resources (14/21)
- Chapter 9 Securing Network Resources (15/21)
- Chapter 9 Securing Network Resources (16/21)
- Chapter 9 Securing Network Resources (17/21)
- Chapter 9 Securing Network Resources (18/21)
- Chapter 9 Securing Network Resources (19/21)
- Chapter 9 Securing Network Resources (20/21)
- Chapter 9 Securing Network Resources (21/21)
- Chapter 10 Securing Network Clients (1/9)
- Chapter 10 Securing Network Clients (2/9)
- Chapter 10 Securing Network Clients (3/9)
- Chapter 10 Securing Network Clients (4/9)
- Chapter 10 Securing Network Clients (5/9)
- Chapter 10 Securing Network Clients (6/9)
- Chapter 10 Securing Network Clients (7/9)
- Chapter 10 Securing Network Clients (8/9)
- Chapter 10 Securing Network Clients (9/9)
- Index (1/4)
- Index (2/4)
- Index (3/4)
- Index (4/4)
Product information
- Title: How to Cheat at Designing Security for a Windows Server 2003 Network
- Author(s):
- Release date: December 2005
- Publisher(s): Syngress
- ISBN: 9780080488967
You might also like
book
Windows Server® 2008 Security Resource Kit
Visit the catalog page for Microsoft® Windows Server 2008™ Security Resource KitVisit the errata page for …
book
Microsoft® Windows® 2000 Security Handbook
Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing …
book
WINDOWS VISTA™ SECURITY: Securing Vista Against Malicious Attacks
Written by two veteran Windows security experts—one a Microsoft Security MVP and Foundstone Security Consultant, and …
book
Apple Training Series: Mac OS X Directory Services v10.6
This reference provides in-depth technical information on Mac OS X and Mac OS X Server's directory …