Securing Windows NT/2000

Book description

In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From

Table of contents

  1. Front Cover
  2. Contents
  3. Preface
  4. 1. Executive Management Overview
  5. 2. What Is Security? (1/4)
  6. 2. What Is Security? (2/4)
  7. 2. What Is Security? (3/4)
  8. 2. What Is Security? (4/4)
  9. 3. What Is a Security Policy? (1/2)
  10. 3. What Is a Security Policy? (2/2)
  11. 4. Implementing a Security Policy (1/5)
  12. 4. Implementing a Security Policy (2/5)
  13. 4. Implementing a Security Policy (3/5)
  14. 4. Implementing a Security Policy (4/5)
  15. 4. Implementing a Security Policy (5/5)
  16. 5. Perimeter Security Scenarios (1/2)
  17. 5. Perimeter Security Scenarios (2/2)
  18. 6. Directions in Security (1/2)
  19. 6. Directions in Security (2/2)
  20. 7. Corporate Security Requirements for Conducting Business over the Internet (1/2)
  21. 7. Corporate Security Requirements for Conducting Business over the Internet (2/2)
  22. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (1/22)
  23. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (2/22)
  24. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (3/22)
  25. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (4/22)
  26. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (5/22)
  27. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (6/22)
  28. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (7/22)
  29. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (8/22)
  30. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (9/22)
  31. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (10/22)
  32. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (11/22)
  33. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (12/22)
  34. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (13/22)
  35. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (14/22)
  36. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (15/22)
  37. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (16/22)
  38. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (17/22)
  39. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (18/22)
  40. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (19/22)
  41. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (20/22)
  42. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (21/22)
  43. 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (22/22)
  44. 9. Enhancing the Security Infrastructure (1/2)
  45. 9. Enhancing the Security Infrastructure (2/2)
  46. Appendices (1/13)
  47. Appendices (2/13)
  48. Appendices (3/13)
  49. Appendices (4/13)
  50. Appendices (5/13)
  51. Appendices (6/13)
  52. Appendices (7/13)
  53. Appendices (8/13)
  54. Appendices (9/13)
  55. Appendices (10/13)
  56. Appendices (11/13)
  57. Appendices (12/13)
  58. Appendices (13/13)
  59. Index (1/3)
  60. Index (2/3)
  61. Index (3/3)

Product information

  • Title: Securing Windows NT/2000
  • Author(s): Michael A. Simonyi
  • Release date: April 2002
  • Publisher(s): Auerbach Publications
  • ISBN: 9781420031461