Securing Windows NT/2000

Book description

A managerial and practical technical tutorial for Windows NT/2000, this book provides an overview of how to develop a strategy to implement security within an organization. It presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The book includes the steps required to define a corporate security policy, how to implement that policy, and how to structure a project plan. Tables, charts, and work templates provide a starting point to begin assessing and implementing a solution that fits the unique needs of an organization. The book concludes by illustrating how to use Check Point FireWall-1/VPN-1 to secure a Windows NT/2000 server.

Table of contents

  1. Front Cover
  2. Contents
  3. Preface
  4. 1. Executive Management Overview
  5. 2. What Is Security? (1/4)
  6. 2. What Is Security? (2/4)
  7. 2. What Is Security? (3/4)
  8. 2. What Is Security? (4/4)
  9. 3. What Is a Security Policy? (1/2)
  10. 3. What Is a Security Policy? (2/2)
  11. 4. Implementing a Security Policy (1/5)
  12. 4. Implementing a Security Policy (2/5)
  13. 4. Implementing a Security Policy (3/5)
  14. 4. Implementing a Security Policy (4/5)
  15. 4. Implementing a Security Policy (5/5)
  16. 5. Perimeter Security Scenarios (1/2)
  17. 5. Perimeter Security Scenarios (2/2)
  18. 6. Directions in Security (1/2)
  19. 6. Directions in Security (2/2)
  20. 7. Corporate Security Requirements for Conducting Business over the Internet (1/2)
  21. 7. Corporate Security Requirements for Conducting Business over the Internet (2/2)
  22. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (1/22)
  23. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (2/22)
  24. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (3/22)
  25. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (4/22)
  26. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (5/22)
  27. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (6/22)
  28. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (7/22)
  29. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (8/22)
  30. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (9/22)
  31. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (10/22)
  32. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (11/22)
  33. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (12/22)
  34. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (13/22)
  35. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (14/22)
  36. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (15/22)
  37. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (16/22)
  38. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (17/22)
  39. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (18/22)
  40. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (19/22)
  41. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (20/22)
  42. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (21/22)
  43. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (22/22)
  44. 9. Enhancing the Security Infrastructure (1/2)
  45. 9. Enhancing the Security Infrastructure (2/2)
  46. Appendices (1/13)
  47. Appendices (2/13)
  48. Appendices (3/13)
  49. Appendices (4/13)
  50. Appendices (5/13)
  51. Appendices (6/13)
  52. Appendices (7/13)
  53. Appendices (8/13)
  54. Appendices (9/13)
  55. Appendices (10/13)
  56. Appendices (11/13)
  57. Appendices (12/13)
  58. Appendices (13/13)
  59. Index (1/3)
  60. Index (2/3)
  61. Index (3/3)

Product information

  • Title: Securing Windows NT/2000
  • Author(s): Michael A. Simonyi
  • Release date: April 2002
  • Publisher(s): Auerbach Publications
  • ISBN: 9781420031461