Microsoft Windows 2000 security
- 作者:
Gupta, Rashi,
- 其他作者:
NIIT (Corporation)
- 出版:
Cincinnati, Ohio : Premier Press ©2003.
- 稽核項:
1 online resource (xx, 508 pages) :illustrations.
- 標題:
Electronic books.
,
COMPUTERS Internet -- Security.
,
Computer security.
,
Microsoft Windows (Computer file)
,
COMPUTERS
,
InternetSecurity.
,
SecurityGeneral.
,
COMPUTERS Networking -- Security.
,
NetworkingSecurity.
,
COMPUTERS Security -- General.
- ISBN:
1931841861 , 9781931841863
- 試查全文@TNUA:
- 附註:
Includes index.
""Contents""; ""Introduction""; ""PART I: WINDOWS 2000 SECURITY� AN OVERVIEW""; ""Chapter 1 Need for Security""; ""What Is at Risk?""; ""Purpose of Security""; ""Types of Attackers""; ""Security Threats""; ""Windows 2000 Core Security Features�A Primer""; ""Windows 2000 Security Model""; ""Summary""; ""Check Your Understanding""; ""Chapter 2 Introducing Windows 2000 Security""; ""Active Directory""; ""Authentication""; ""Accessing Network Resources""; ""Configuration Management""; ""Data Encryption""; ""Public Key Infrastructure""; ""Summary""
""PART II: AN INSIGHT INTO WINDOWS 2000 SECURITY FEATURES""""Chapter 3 Authentication""; ""Introduction to Authentication""; ""Kerberos V5 Authentication Protocol""; ""Security Support Provider""; ""Other Authentication Protocols""; ""Summary""; ""Check Your Understanding""; ""Chapter 4 Authorization and Access Control""; ""An Overview of Windows 2000 Access Control""; ""Configuring Access Control Permissions""; ""Encryption File System""; ""Securing the Print Resource""; ""Summary""; ""Check Your Understanding""; ""Chapter 5 Security Policies""; ""Group Policy�An Overview""
""Group Policy Processing""""Using Group Policy Tools""; ""Windows 2000 Security Templates�An Overview""; ""Summary""; ""Check Your Understanding""; ""PART III: NETWORK SECURITY""; ""Chapter 6 Public Key Infrastructure""; ""What Is Public Key Cryptography?""; ""Windows 2000 PKI""; ""Summary""; ""Check Your Understanding""; ""Chapter 7 Network Services""; ""DNS: An Overview""; ""DHCP: An Overview""; ""SNMP""; ""RIS""; ""Terminal Services""; ""Summary""; ""Check Your Understanding""; ""Chapter 8 Internet Security""; ""IPSec""; ""Firewalls""; ""Summary""; ""Check Your Understanding""
""Chapter 9 Internet Information Server (IIS)""""IIS: An Overview""; ""IIS Authentication""; ""Access Control""; ""Summary""; ""Check Your Understanding""; ""Chapter 10 Remote Access and VPN""; ""Remote Access Services""; ""Virtual Private Networking""; ""IAS""; ""Summary""; ""Check Your Understanding""; ""PART IV: OTHER SECURITY FEATURES""; ""Chapter 11 Reliability Features of Windows 2000""; ""Diagnostic Tools""; ""Windows File Protection Feature""; ""Fault Tolerance""; ""Backup""; ""System Recovery""; ""Summary""; ""Check Your Understanding""; ""Chapter 12 Securing Non-Microsoft Clients""
""Securing Access to UNIX Clients""""Securing Access with NetWare""; ""Securing Access with Macintosh Clients""; ""Summary""; ""Check Your Understanding""; ""PART V: APPENDIXES""; ""Appendix A: Best Practices""; ""Auditing""; ""Securing CAs""; ""EFS""; ""Security Configuration and Analysis""; ""Security Templates""; ""Acess Control""; ""Active Directory""; ""Group Policy""; ""Software Installation and Management""; ""Folder Redirection""; ""Distributed File System (Dfs)""; ""Network and Dial-up Connections""; ""TCP/IP Protocol""; ""DNS""; ""Server Best Practices""; ""DHCP""
- 電子資源:
https://dbs.tnua.edu.tw/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=83773
- 系統號:
005302210
-
資料類型:
電子書
- 讀者標籤:
需登入
-
引用網址:
複製連結
-
目前引用數
-