Hardening Windows
System administrators know the Internet is a hostile environment. They can't tell when a hacker will attempt to gain access to the SQL server, but they can bet that there will be an attempt soon. Because the operating system is vital to a computer's functioning, and because it's the o...
Main Author: | |
---|---|
Corporate Author: | |
Format: | eBook |
Language: | English |
Published: |
Berkeley, CA
Apress
2004, 2004
|
Edition: | 1st ed. 2004 |
Subjects: | |
Online Access: | |
Collection: | Springer Book Archives -2004 - Collection details see MPG.ReNa |
Table of Contents:
- 1 Hardening: Theory and General Practice
- 2 Windows NT Security
- 3 Windows 2000 Security
- 4 Windows XP Security
- 5 Defining Enterprise Security Policies with Windows 2000 and Later
- 6 Patch Management
- 7 Network Access Quarantine Control
- 8 Internet Information Services Security
- 9 Exchange 2000 Server Security
- 10 Security Auditing and Event Logs
- Appendix Quick-Reference Checklists