Book description
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From
Table of contents
- Front Cover
- Contents
- Preface
- 1. Executive Management Overview
- 2. What Is Security? (1/4)
- 2. What Is Security? (2/4)
- 2. What Is Security? (3/4)
- 2. What Is Security? (4/4)
- 3. What Is a Security Policy? (1/2)
- 3. What Is a Security Policy? (2/2)
- 4. Implementing a Security Policy (1/5)
- 4. Implementing a Security Policy (2/5)
- 4. Implementing a Security Policy (3/5)
- 4. Implementing a Security Policy (4/5)
- 4. Implementing a Security Policy (5/5)
- 5. Perimeter Security Scenarios (1/2)
- 5. Perimeter Security Scenarios (2/2)
- 6. Directions in Security (1/2)
- 6. Directions in Security (2/2)
- 7. Corporate Security Requirements for Conducting Business over the Internet (1/2)
- 7. Corporate Security Requirements for Conducting Business over the Internet (2/2)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (1/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (2/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (3/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (4/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (5/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (6/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (7/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (8/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (9/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (10/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (11/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (12/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (13/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (14/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (15/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (16/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (17/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (18/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (19/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (20/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (21/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (22/22)
- 9. Enhancing the Security Infrastructure (1/2)
- 9. Enhancing the Security Infrastructure (2/2)
- Appendices (1/13)
- Appendices (2/13)
- Appendices (3/13)
- Appendices (4/13)
- Appendices (5/13)
- Appendices (6/13)
- Appendices (7/13)
- Appendices (8/13)
- Appendices (9/13)
- Appendices (10/13)
- Appendices (11/13)
- Appendices (12/13)
- Appendices (13/13)
- Index (1/3)
- Index (2/3)
- Index (3/3)
Product information
- Title: Securing Windows NT/2000
- Author(s):
- Release date: April 2002
- Publisher(s): Auerbach Publications
- ISBN: 9781420031461
You might also like
book
Learning ServiceNow
IT service management automation at your fingertipsAbout This Book Learn to leverage ServiceNow's capabilities for improved …
book
Python Crash Course, 3rd Edition
Python Crash Course is the world's best-selling guide to the Python guide programming language, with over …
book
Ethical Hacking
A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the …
book
Object-Oriented Programming with C++
Object-Oriented Programming (OOP) is a paradigm shift in programming, which defines, creates, and manipulates objects to …