Windows NT Security Guide - Stephen A. Sutton

Windows NT Security Guide

Buch | Softcover
384 Seiten
1997
Addison Wesley (Verlag)
978-0-201-41969-6 (ISBN)
35,15 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
A guide that introduces administrators to the security features found in Windows NT and shows how to integrate them into their networked environment. This text addresses real-world questions and common threats such as, data snooping, password misuse and viruses.
"I will recommend Steve's new book to our customers. Steve's knowledge of operating systems security and government security requirements give him a deep understanding of how to utilize Windows NT in a secure manner." Curt Kolcun Systems Engineering Manager Microsoft "I found Windows NT Security Guide to be a true gem...it's not just a good book on security, it is instructional by design." Christopher Brown San Diego Windows NT User Group A Survival Guide for Safeguarding Your Windows NT System and Its Networks! Your computers are at risk, whether they are connected to a corporate intranet or the Internet, have access to a sensitive database, or simply sit on your desk when you're not there. In the Windows NT Security Guide, Steve Sutton, a security expert and corporate trainer, shows you how to maximize Windows NT's various security protections and avoid many of its pitfalls. This book explains NT's security features from a step-by-step, how-to perspective with numerous realistic examples. Whether you are a day-to-day user or network administrator, you'll find Windows NT Security Guide an invaluable reference.Windows NT Security Guide helps you: *Spot and protect against common threats, such as data snooping and tampering, password misuse, and viruses *Configure Windows NT against Internet and intranet security risks *Build your Security Policy for user accounts and groups, domains, Access Control Lists, and the security log *Understand the basics of cryptography that play large roles in today's global Internet environment *Use some of NT's lesser-known secure installation practices and cope with its inherent security soft spots *Answer the basic question: Is Windows NT secure enough for me?
This book is accompanied by a complete set of on-line exercises and many "pencil" questions (and answers) so that you can also use it as a self-paced training tool. 0201419696B04062001

Steve Sutton is the founder of Trusted Systems Services, Inc., a computer-security consulting- and training company formed in 1986. He has been a prominent designer and teacher of secure operating systems and standards for almost two decades. 0201419696AB04062001

I. GENERAL USE.

1. Introduction.


In This Chapter We Describe.



Windows NT and Security.



Trust, Threats, and the TCB.



About This Book.



Prerequisites.



Icons, Conventions, and Typography.

2. Accounts and Domains.


In This Chapter We Describe.



Domains and Workstations.



Accounts and the Logon Session.



Summary.

3. Your Working Environment.


In This Chapter We Describe.



The Trusted Path.



Choosing Passwords.



Other Topics.



Summary.

4. ACLs.


In This Chapter We Describe.



Introduction.



Groups.



Basic ACLs for Files.



The Access Decision.



Basic ACLs for Directories.



ACL Propagation: Protecting Trees.



Assorted ACL Topics.



Summary.

5. Special Situations.


Local Accounts and Matching.



In This Section We Describe.



Using the Remote Access Service.



Windows 95.



Windows for Workgroups.

II. ADMINISTRATION.

6. Planning Domains.


In This Chapter We Describe.



What Is Security "Administration"?.



Planning Domains.



Summary.

7. Managing Groups and Accounts.


In This Chapter We Describe.



User Groups.



Accounts.



The Rights Policy.



Administrative Access.

8. Security Auditing.


In This Chapter We Describe.



The Mechanics of Auditing.



Common Auditing Scenarios.



Working with the Security Log.



Deciding What to Audit.



Summary.

9. The Internet and Intranets.


In This Chapter We Describe.



Windows NT and Intranets.



Cryptography.



Internet Information Server.



Other Networking Topics.

10. Subsystems and Other Security Features.


In This Chapter We Describe.



NT Registry.



System Policy Editor.



Printers.



Administering Windows 95.



Administering WFW.



Other Topics.

11. The TCB.


In This Chapter We Describe.



What Constitutes the TCB?



Protecting the TCB.



Summary.

12. Summary and Checklist.


General User Education.



Domain Model and Network Administration.



Groups.



General Access to Workstations.



Accounts.



Security Auditing.



The TCB.



General.



Networking.

13. NT Security Discussion.


The TCSEC.



Windows NT and the TCSEC.



Networking.



NT Security Feature by Feature.



Third-Party Watch.

Appendix A: Secure Installation.


The Registry.



File System ACLs.



Rights Policy.



Troubleshooting.



Miscellaneous.

Appendix B: Glossary.
Appendix C: Answers.
Index.

Erscheint lt. Verlag 11.2.1997
Verlagsort Boston
Sprache englisch
Maße 188 x 233 mm
Gewicht 635 g
Themenwelt Informatik Betriebssysteme / Server Windows
Informatik Betriebssysteme / Server Windows Server
Mathematik / Informatik Informatik Netzwerke
Informatik Theorie / Studium Kryptologie
ISBN-10 0-201-41969-6 / 0201419696
ISBN-13 978-0-201-41969-6 / 9780201419696
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Daten abfragen und verarbeiten mit Excel und Power BI

von Ignaz A. Schels

Buch (2023)
Hanser (Verlag)
49,99
Das umfassende Handbuch

von Peter Kloep; Karsten Weigel; Raphael Rojas; Kevin Momber …

Buch | Hardcover (2021)
Rheinwerk (Verlag)
69,90