Windows 2000 Security Handbook


Book Description

This work provides useful information for administrators who need to manage and secure their Windows 2000 networks. It teaches readers how to integrate Windows 2000 security into their existing Windows NT and legacy networking environments.




Microsoft Windows 2000 Security Handbook


Book Description

Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing secure applications for Windows 2000.




Maximum Windows 2000 Security


Book Description

Written from the hacker's perspective,Maximum Windows 2000 Securityis a comprehensive, solutions-oriented guide to Windows 2000 security.Topics include: Physical & File System Security, Password Security, Malicious Code, Windows 2000 Network Security Architecture and Professional Protocols, Web Server Security, Denial of Service Attacks, Intrusion Detection, Hacking Secure Code in Windows 2000.




Computer Security Handbook


Book Description

"Computer Security Handbook" - Jetzt erscheint der Klassiker in der 4. aktualisierten Auflage. Es ist das umfassendste Buch zum Thema Computersicherheit, das derzeit auf dem Markt ist. In 23 Kapiteln und 29 Anhängen werden alle Aspekte der Computersicherheit ausführlich behandelt. Die einzelnen Kapitel wurden jeweils von renommierten Experten der Branche verfasst. Übersichtlich aufgebaut, verständlich und anschaulich geschrieben. Das "Computer Security Handbook" wird in Fachkreisen bereits als DAS Nachschlagewerk zu Sicherheitsfragen gehandelt.




Windows 2000 Professional Handbook


Book Description

Focusing on the needs of the technical professional who is responsible for a series of Windows NT and Windows 2000 systems, The Windows 2000 Professional Handbook is designed to be both a handy desk reference in addition to a textbook for MCSE courses. This book provides readers with insights into how Microsoft's latest enterprise-based operating system solves the connectivity challenges with hands-on examples and cases that arise in organizations running multiple operating systems.




Windows 2000 Performance Guide


Book Description

For repairing performance loss or maximizing current potential, this guide aims to provide the information and conceptual framework that will enable readers to be performance experts. Includes information on processor performance, application profiling and hardware considerations.




Computer Security Handbook, Set


Book Description

The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapters contributed by a panel of renowned industry professionals, the new edition has increased coverage in both breadth and depth of all ten domains of the Common Body of Knowledge defined by the International Information Systems Security Certification Consortium (ISC). Of the seventy-seven chapters in the fifth edition, twenty-five chapters are completely new, including: 1. Hardware Elements of Security 2. Fundamentals of Cryptography and Steganography 3. Mathematical models of information security 4. Insider threats 5. Social engineering and low-tech attacks 6. Spam, phishing, and Trojans: attacks meant to fool 7. Biometric authentication 8. VPNs and secure remote access 9. Securing Peer2Peer, IM, SMS, and collaboration tools 10. U.S. legal and regulatory security issues, such as GLBA and SOX Whether you are in charge of many computers or just one important one, there are immediate steps you can take to safeguard your computer system and its contents. Computer Security Handbook, Fifth Edition equips you to protect the information and networks that are vital to your organization.




The Hacker's Handbook


Book Description

This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.




Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations


Book Description

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.




Implementing and Administering Security in a Windows 2000 Network


Book Description

& Published under the direction of Series Editor Ed Tittel, the leading authority on certification and the founder of The Exam Cram Method series & & CD-ROM features PrepLogic Practice Tests & & Exam Cram 2 is Cramsession Approved Study Material