How to Cheat at Designing Security for a Windows Server 2003 Network

Book description

Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.

While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.

* The Perfect Guide if "System Administrator is NOT your primary job function

* Avoid "time drains" configuring the many different security standards built into Windows 2003

* Secure VPN and Extranet Communications

Table of contents

  1. Cover
  2. Front Matter (1/2)
  3. Front Matter (2/2)
  4. Contents (1/3)
  5. Contents (2/3)
  6. Contents (3/3)
  7. Chapter 1 Designing a Secure Network Framework (1/8)
  8. Chapter 1 Designing a Secure Network Framework (2/8)
  9. Chapter 1 Designing a Secure Network Framework (3/8)
  10. Chapter 1 Designing a Secure Network Framework (4/8)
  11. Chapter 1 Designing a Secure Network Framework (5/8)
  12. Chapter 1 Designing a Secure Network Framework (6/8)
  13. Chapter 1 Designing a Secure Network Framework (7/8)
  14. Chapter 1 Designing a Secure Network Framework (8/8)
  15. Chapter 2 Securing Servers Based on Function. (1/17)
  16. Chapter 2 Securing Servers Based on Function. (2/17)
  17. Chapter 2 Securing Servers Based on Function. (3/17)
  18. Chapter 2 Securing Servers Based on Function. (4/17)
  19. Chapter 2 Securing Servers Based on Function. (5/17)
  20. Chapter 2 Securing Servers Based on Function. (6/17)
  21. Chapter 2 Securing Servers Based on Function. (7/17)
  22. Chapter 2 Securing Servers Based on Function. (8/17)
  23. Chapter 2 Securing Servers Based on Function. (9/17)
  24. Chapter 2 Securing Servers Based on Function. (10/17)
  25. Chapter 2 Securing Servers Based on Function. (11/17)
  26. Chapter 2 Securing Servers Based on Function. (12/17)
  27. Chapter 2 Securing Servers Based on Function. (13/17)
  28. Chapter 2 Securing Servers Based on Function. (14/17)
  29. Chapter 2 Securing Servers Based on Function. (15/17)
  30. Chapter 2 Securing Servers Based on Function. (16/17)
  31. Chapter 2 Securing Servers Based on Function. (17/17)
  32. Chapter 3 Designing a Secure Public Key Infrastructure (1/8)
  33. Chapter 3 Designing a Secure Public Key Infrastructure (2/8)
  34. Chapter 3 Designing a Secure Public Key Infrastructure (3/8)
  35. Chapter 3 Designing a Secure Public Key Infrastructure (4/8)
  36. Chapter 3 Designing a Secure Public Key Infrastructure (5/8)
  37. Chapter 3 Designing a Secure Public Key Infrastructure (6/8)
  38. Chapter 3 Designing a Secure Public Key Infrastructure (7/8)
  39. Chapter 3 Designing a Secure Public Key Infrastructure (8/8)
  40. Chapter 4 Securing the Network Management Process (1/8)
  41. Chapter 4 Securing the Network Management Process (2/8)
  42. Chapter 4 Securing the Network Management Process (3/8)
  43. Chapter 4 Securing the Network Management Process (4/8)
  44. Chapter 4 Securing the Network Management Process (5/8)
  45. Chapter 4 Securing the Network Management Process (6/8)
  46. Chapter 4 Securing the Network Management Process (7/8)
  47. Chapter 4 Securing the Network Management Process (8/8)
  48. Chapter 5 Securing Network Services and Protocols (1/29)
  49. Chapter 5 Securing Network Services and Protocols (2/29)
  50. Chapter 5 Securing Network Services and Protocols (3/29)
  51. Chapter 5 Securing Network Services and Protocols (4/29)
  52. Chapter 5 Securing Network Services and Protocols (5/29)
  53. Chapter 5 Securing Network Services and Protocols (6/29)
  54. Chapter 5 Securing Network Services and Protocols (7/29)
  55. Chapter 5 Securing Network Services and Protocols (8/29)
  56. Chapter 5 Securing Network Services and Protocols (9/29)
  57. Chapter 5 Securing Network Services and Protocols (10/29)
  58. Chapter 5 Securing Network Services and Protocols (11/29)
  59. Chapter 5 Securing Network Services and Protocols (12/29)
  60. Chapter 5 Securing Network Services and Protocols (13/29)
  61. Chapter 5 Securing Network Services and Protocols (14/29)
  62. Chapter 5 Securing Network Services and Protocols (15/29)
  63. Chapter 5 Securing Network Services and Protocols (16/29)
  64. Chapter 5 Securing Network Services and Protocols (17/29)
  65. Chapter 5 Securing Network Services and Protocols (18/29)
  66. Chapter 5 Securing Network Services and Protocols (19/29)
  67. Chapter 5 Securing Network Services and Protocols (20/29)
  68. Chapter 5 Securing Network Services and Protocols (21/29)
  69. Chapter 5 Securing Network Services and Protocols (22/29)
  70. Chapter 5 Securing Network Services and Protocols (23/29)
  71. Chapter 5 Securing Network Services and Protocols (24/29)
  72. Chapter 5 Securing Network Services and Protocols (25/29)
  73. Chapter 5 Securing Network Services and Protocols (26/29)
  74. Chapter 5 Securing Network Services and Protocols (27/29)
  75. Chapter 5 Securing Network Services and Protocols (28/29)
  76. Chapter 5 Securing Network Services and Protocols (29/29)
  77. Chapter 6 Securing Internet Information Services (1/11)
  78. Chapter 6 Securing Internet Information Services (2/11)
  79. Chapter 6 Securing Internet Information Services (3/11)
  80. Chapter 6 Securing Internet Information Services (4/11)
  81. Chapter 6 Securing Internet Information Services (5/11)
  82. Chapter 6 Securing Internet Information Services (6/11)
  83. Chapter 6 Securing Internet Information Services (7/11)
  84. Chapter 6 Securing Internet Information Services (8/11)
  85. Chapter 6 Securing Internet Information Services (9/11)
  86. Chapter 6 Securing Internet Information Services (10/11)
  87. Chapter 6 Securing Internet Information Services (11/11)
  88. Chapter 7 Securing VPN and Extranet Communications (1/8)
  89. Chapter 7 Securing VPN and Extranet Communications (2/8)
  90. Chapter 7 Securing VPN and Extranet Communications (3/8)
  91. Chapter 7 Securing VPN and Extranet Communications (4/8)
  92. Chapter 7 Securing VPN and Extranet Communications (5/8)
  93. Chapter 7 Securing VPN and Extranet Communications (6/8)
  94. Chapter 7 Securing VPN and Extranet Communications (7/8)
  95. Chapter 7 Securing VPN and Extranet Communications (8/8)
  96. Chapter 8 Securing Active Directory . (1/9)
  97. Chapter 8 Securing Active Directory . (2/9)
  98. Chapter 8 Securing Active Directory . (3/9)
  99. Chapter 8 Securing Active Directory . (4/9)
  100. Chapter 8 Securing Active Directory . (5/9)
  101. Chapter 8 Securing Active Directory . (6/9)
  102. Chapter 8 Securing Active Directory . (7/9)
  103. Chapter 8 Securing Active Directory . (8/9)
  104. Chapter 8 Securing Active Directory . (9/9)
  105. Chapter 9 Securing Network Resources (1/21)
  106. Chapter 9 Securing Network Resources (2/21)
  107. Chapter 9 Securing Network Resources (3/21)
  108. Chapter 9 Securing Network Resources (4/21)
  109. Chapter 9 Securing Network Resources (5/21)
  110. Chapter 9 Securing Network Resources (6/21)
  111. Chapter 9 Securing Network Resources (7/21)
  112. Chapter 9 Securing Network Resources (8/21)
  113. Chapter 9 Securing Network Resources (9/21)
  114. Chapter 9 Securing Network Resources (10/21)
  115. Chapter 9 Securing Network Resources (11/21)
  116. Chapter 9 Securing Network Resources (12/21)
  117. Chapter 9 Securing Network Resources (13/21)
  118. Chapter 9 Securing Network Resources (14/21)
  119. Chapter 9 Securing Network Resources (15/21)
  120. Chapter 9 Securing Network Resources (16/21)
  121. Chapter 9 Securing Network Resources (17/21)
  122. Chapter 9 Securing Network Resources (18/21)
  123. Chapter 9 Securing Network Resources (19/21)
  124. Chapter 9 Securing Network Resources (20/21)
  125. Chapter 9 Securing Network Resources (21/21)
  126. Chapter 10 Securing Network Clients (1/9)
  127. Chapter 10 Securing Network Clients (2/9)
  128. Chapter 10 Securing Network Clients (3/9)
  129. Chapter 10 Securing Network Clients (4/9)
  130. Chapter 10 Securing Network Clients (5/9)
  131. Chapter 10 Securing Network Clients (6/9)
  132. Chapter 10 Securing Network Clients (7/9)
  133. Chapter 10 Securing Network Clients (8/9)
  134. Chapter 10 Securing Network Clients (9/9)
  135. Index (1/4)
  136. Index (2/4)
  137. Index (3/4)
  138. Index (4/4)

Product information

  • Title: How to Cheat at Designing Security for a Windows Server 2003 Network
  • Author(s): Chris Peiris, Chris Ruston
  • Release date: December 2005
  • Publisher(s): Syngress
  • ISBN: 9780080488967