Microsoft Windows Security Fundamentals -  Jan De Clercq,  Guido Grillenmeier

Microsoft Windows Security Fundamentals (eBook)

For Windows 2003 SP1 and R2
eBook Download: PDF
2011 | 1. Auflage
832 Seiten
Elsevier Science (Verlag)
978-0-08-049188-2 (ISBN)
Systemvoraussetzungen
70,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks.

Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.

* Covers all SP1 and SP2 updates
* Details strategies for patch management
* Provides key techniques to maintain security application upgrades and updates
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks. Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.* Covers all SP1 and SP2 updates* Details strategies for patch management* Provides key techniques to maintain security application upgrades and updates

Front Cover 1
Microsoft® Windows Security Fundamentals 4
Copyright Page 5
Contents 8
Foreword by Tony Redmond 16
Foreword by Mark Mortimore 18
Foreword by Steven Adler 22
Preface 24
Acknowledgments 28
Part I: Introduction 30
Chapter 1. The Challenge of Trusted Security Infrastructures 32
1.1 Introduction 32
1.2 Positioning Trusted Security Infrastructures 34
1.3 The Fundamental Role of Trust 37
1.4 Trusted Security Infrastructure Roles 37
1.5 The Next Step: Federation 52
1.6 Identity Management and Trusted Security Infrastructures 56
1.7 Microsoft and the Challenge of Trusted Security Infrastructures 60
1.8 Conclusion 64
Chapter 2. Windows Security Authorities and Principals 66
2.1 Security Authorities 66
2.2 Security Principals 82
Chapter 3. Windows Trust Relationships 138
3.1 Defining Trust Relationships 138
3.2 Trust Properties, Types, and Features 140
3.3 Restricting Trusts 151
3.4 Working with Trusts 168
3.5 Trust Relationships: Under the Hood 179
3.6 Trusts and Secure Channels 183
3.7 Trusts and Firewalls 190
Chapter 4. Aspects of Windows Client Security 194
4.1 Client Security Overview 194
4.2 Least Privilege 195
4.3 Windows XP Service Pack 2 Security Enhancements 207
4.4 Browser Security 215
4.5 Malicious Mobile Code Protection 234
4.6 Leveraging Trusted Platform Module Security Functions 244
4.7 Important Windows Vista and IE 7.0 Client Security Features 257
Part II: Authentication 260
Chapter 5. Introducing Windows Authentication 262
5.1 Authentication Basics 262
5.2 Windows Authentication Basics 267
5.3 Logon Rights 284
5.4 NTLM-Based Authentication 290
5.5 Anonymous Access 300
5.6 Credential Caching 306
5.7 Limiting Concurrent Logon Sessions 310
5.8 General Authentication Troubleshooting 321
5.9 What’s in the Other Authentication Chapters? 330
Chapter 6. Kerberos 332
6.1 Introducing Kerberos 332
6.2 Kerberos: The Basic Protocol 336
6.3 Logging on to Windows Using Kerberos 356
6.4 Advanced Kerberos Topics 374
6.5 Kerberos Configuration 419
6.6 Kerberos Troubleshooting 423
6.7 Kerberos Interoperability 425
Chapter 7. IIS Authentication 438
7.1 Secure by Default in IIS 6.0 438
7.2 Introducing IIS Authentication 440
7.3 HTTP Authentication 443
7.4 Integrated Windows Authentication 455
7.5 Passport-Based Authentication 457
7.6 Certificate-Based Authentication 474
7.7 IIS Authentication Method Comparison 504
Chapter 8. UNIX/Linux and Windows Authentication Integration 506
8.1 Comparing Windows and UNIX/Linux Authentication 507
8.2 Interoperability Enabling Technologies 508
8.3 UNIX/Linux Security-Related Concepts 513
8.4 Windows and UNIX/Linux Account Management and Authentication Integration Approaches 527
8.5 Summary 561
Chapter 9. Single Sign-On 562
9.1 SSO: Pros and Cons 562
9.2 Web versus Enterprise SSO 563
9.3 SSO Architectures 564
9.4 Extending SSO 579
9.5 Microsoft SSO Technologies 582
9.6 Conclusion 608
Part III: Authorization 610
Chapter 10. Windows Server 2003 Authorization 612
10.1 Authorization Basics 612
10.2 The Windows Authorization Model 613
10.3 Authorization Intermediaries 619
10.4 Windows 2000 Authorization Changes 653
10.5 Windows Server 2003 Authorization Changes 688
10.6 Authorization Tools 719
Chapter 11. Active Directory Delegation 722
11.1 Introduction 722
11.2 General AD Delegation Guidelines 734
11.3 Setting up Administrative Delegation 748
11.4 Hiding Objects in AD 761
11.5 Third-Party AD Delegation Tools 800
Index 802

Erscheint lt. Verlag 8.4.2011
Sprache englisch
Themenwelt Informatik Betriebssysteme / Server Windows
Informatik Betriebssysteme / Server Windows Server
Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Office Programme Outlook
Informatik Theorie / Studium Kryptologie
ISBN-10 0-08-049188-X / 008049188X
ISBN-13 978-0-08-049188-2 / 9780080491882
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 17,6 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der leichte Weg zur eigenen Cloud.Daten sicher speichern und teilen

von Herbert Hertramph

eBook Download (2023)
MITP Verlags GmbH & Co. KG
24,99