Book description
A managerial and practical technical tutorial for Windows NT/2000, this book provides an overview of how to develop a strategy to implement security within an organization. It presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The book includes the steps required to define a corporate security policy, how to implement that policy, and how to structure a project plan. Tables, charts, and work templates provide a starting point to begin assessing and implementing a solution that fits the unique needs of an organization. The book concludes by illustrating how to use Check Point FireWall-1/VPN-1 to secure a Windows NT/2000 server.
Table of contents
- Front Cover
- Contents
- Preface
- 1. Executive Management Overview
- 2. What Is Security? (1/4)
- 2. What Is Security? (2/4)
- 2. What Is Security? (3/4)
- 2. What Is Security? (4/4)
- 3. What Is a Security Policy? (1/2)
- 3. What Is a Security Policy? (2/2)
- 4. Implementing a Security Policy (1/5)
- 4. Implementing a Security Policy (2/5)
- 4. Implementing a Security Policy (3/5)
- 4. Implementing a Security Policy (4/5)
- 4. Implementing a Security Policy (5/5)
- 5. Perimeter Security Scenarios (1/2)
- 5. Perimeter Security Scenarios (2/2)
- 6. Directions in Security (1/2)
- 6. Directions in Security (2/2)
- 7. Corporate Security Requirements for Conducting Business over the Internet (1/2)
- 7. Corporate Security Requirements for Conducting Business over the Internet (2/2)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (1/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (2/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (3/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (4/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (5/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (6/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (7/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (8/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (9/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (10/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (11/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (12/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (13/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (14/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (15/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (16/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (17/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (18/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (19/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (20/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (21/22)
- 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000 (22/22)
- 9. Enhancing the Security Infrastructure (1/2)
- 9. Enhancing the Security Infrastructure (2/2)
- Appendices (1/13)
- Appendices (2/13)
- Appendices (3/13)
- Appendices (4/13)
- Appendices (5/13)
- Appendices (6/13)
- Appendices (7/13)
- Appendices (8/13)
- Appendices (9/13)
- Appendices (10/13)
- Appendices (11/13)
- Appendices (12/13)
- Appendices (13/13)
- Index (1/3)
- Index (2/3)
- Index (3/3)
Product information
- Title: Securing Windows NT/2000
- Author(s):
- Release date: April 2002
- Publisher(s): Auerbach Publications
- ISBN: 9781420031461
You might also like
book
Securing Windows NT/2000 Servers for the Internet
In recent years, Windows NT and Windows 2000 systems have emerged as viable platforms for Internet …
book
IBM Versatile Storage Server
This IBM Redbooks publication gives a broad understanding of the new architecture of the Versatile Storage …
book
Windows 2000 Pro: The Missing Manual
Windows 2000 Pro combines the friendly interface of Windows 98 with the famous stability of Windows …
book
Win32 System Services: The Heart of Windows® 98 and Windows® 2000
The Win32 best-seller, fully updated for Windows 2000 and Windows 98! Master every key Win32 system …