Securing the Vista environment

"Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Secu...

Full description

Bibliographic Details
Main Author: Gregory, Peter H.
Format: eBook
Language:English
Published: Sebastopol, Calif. O'Reilly 2007
Series:O'Reilly short cut
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 01840nmm a2200373 u 4500
001 EB001944378
003 EBX01000000000000001107280
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780596514303 
050 4 |a QA76.9.A25 
100 1 |a Gregory, Peter H. 
245 0 0 |a Securing the Vista environment  |c by Peter Gregory 
260 |a Sebastopol, Calif.  |b O'Reilly  |c 2007 
300 |a 1 online resource 
653 |a PHILOSOPHY / Reference / bisacsh 
653 |a Sécurité informatique 
653 |a PHILOSOPHY / Essays / bisacsh 
653 |a Computer security / blmlsh 
653 |a Microsoft Windows (Computer file) / blmlsh 
653 |a Microsoft Windows (Computer file) / fast 
653 |a Microsoft Windows (Computer file) 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Computer security / fast 
653 |a Computer Security 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a O'Reilly short cut 
776 |z 0596514301 
776 |z 9780596514303 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780596514303/?ar  |x Verlag  |3 Volltext 
082 0 |a 100 
520 |a "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo