Für diesen Artikel ist leider kein Bild verfügbar.

Windows NT 4.0 Server Security Guide

Media-Kombination
352 Seiten
1998
Prentice Hall
978-0-13-679903-0 (ISBN)
56,85 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Provides a coverage of account security, identification, authentication, access control lists, object security, physical security, securing the Registry, remote access, and internetworking with NetWare. This book shows how to supplement built-in NT security with firewalls, proxy servers and other mechanisms.
NT isn't nearly as secure as Microsoft would like you to think -- and if you're building enterprise applications on it, you'd better know how to close those gaping holes! This is the first systematic, expert guide to making NT the secure operating system it's supposed to be. The Windows NT Security Guide presents end-to-end coverage of account security, identification, authentication, access control lists, object security, physical security, securing the Registry, remote access, internetworking with NetWare, and much more. It shows how to supplement built-in NT security with firewalls, proxy servers and other mechanisms. It introduces third-party products, consultants and organizations that can help you improve NT security in your environment. Finally, it previews and evaluates the forthcoming improvements to NT's security model that will be part of Windows NT 5.0. Windows NT Security Guide is a must read for every Windows NT network administrator.

Marcus Goncalves is a Systems Engineer with Process Systems Corporation, with extensive experience in NT and Web system management and security.

(NOTE: Each chapter concludes with Whats Next?) 1. Windows NT and the Competition. History of Windows NT. An Overview of the NT Server 4.0. What about BackOffice? 2. The NT Server 4.0 Architecture: A Quick Review. The Challenges of Building a Secure Operating System. Characteristics of the Architecture. The Architectural Modules. Implementing Workgroups and Domains. File System Support for NT 4.0. Planning for NT 5.0 3. Understanding and Planning Security on NT-based Networks. NT Security Concepts. Monitoring Your Network: Using Network Monitor. Groups and Users. Defining a Security Policy. 4. Evaluating Network Configuration. Basic Networking Architecture. Enhancing Security with the Right Protocols. NTs Network Protocols. Enhancing Security with DHCP. NTs Network Log-on Services. 5. Implementing Security on the NT 4.0 Server. Securing NT: Start with a Security Policy. Reviewing NT Security. Watch for Windows 95 Clients. 6. Managing the Server Security. Basic Network Security Issues. Recommendations for Installing the NT Server 4.0. Using the Microsoft Security Configuration Editor. 7. Physical Security. Managing Disk Systems. 8. NT Tunneling Features: The PPTP Protocol. An Overview of PPTP. An Overview of RADIUS. Microsoft Virtual Pirate Network. Security Aspects of VPN. 9. NTs Remote Access Services. RAS Features in the NT Server 4.0. RAS Design and Configuration. RAS Security Issues: Configuring RAS with Your Domains. Reviewing Relevant RAS Configurations. Connecting to an RAS Server. Configuration Checklist. 10. Securing Your Network: The_TCP/IP Challenge. An Overview of TCP/IP. User Datagram Protocol: Datagrams at Risk. The TCP Protocol. Simple Network Management Protocol. Watch Your ISP Connection. Securing Your Network. Access Control Techniques. Access Control Lists. Mandatory Access Control. 11. Enhancing Your Server Security: Tools for the Internet. Implementing Certificate Servers. Using Kerberos for Enhanced Security. A Security Policy Template. 12. So Youre a NetWare Advocate: NT versus NetWare. IPX Protocol and NetWare IP versus DHCP and WINS. The Microsoft Directory Service Manager for NetWare. Watch the NetWare Hackers! 13. So Youre a UNIX Advocate: NT versus UNIX. Once upon a Time: UNIX and NT. The Need for Porting Windows-based Applications to UNIX. NT versus UNIX: A Security Perspective. 14. Optimizing the Performance of the NT Server. NT Performance Monitoring System. Setting Alerts with Performance Monitor. NT Networking and Hardware Configuration Checklist. Tuning Specific NT Subsystems. Tuning NTs CPU. 15. The NT 4.0 Registry. Working with the Registry. Windows 95 Registry Editor. A Few Tips (and Alerts) When Working with the Registry. 16. Enhancing NT Security with Encryption Tools. Symmetric Key Encryption (Private Keys). Asymmetric-key Encryption or Public-key Encryption. Message Digest Algorithms. Use of Certificates. Key Management. Security Policy and Procedures Checklist. 17. Intranet and Extranet Security. Intranets: Are They Only a Misspelling? Building Intranets with IIS: A Security Issue. Risks of Webcrawlers. Archiving Users Discussion on the Intranet. Providing Secure Extranet Services. Microsoft Exchange and the Extranet. 18. Looking Ahead: What to Look for in Windows NT 5.0. Focusing on NT 5.0 Benefits. Security in 5.0. Upgrading from NT 4.0 to NT 5.0. Glossary. Appendix A: The System Difference Utility (Sysdiff). Appendix B: NTs Hardware Compatibility List. Appendix C: What is on the CD? Index.

Erscheint lt. Verlag 18.5.1998
Verlagsort Upper Saddle River
Sprache englisch
Maße 180 x 235 mm
Gewicht 897 g
Themenwelt Informatik Betriebssysteme / Server Windows
Informatik Betriebssysteme / Server Windows Server
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
ISBN-10 0-13-679903-5 / 0136799035
ISBN-13 978-0-13-679903-0 / 9780136799030
Zustand Neuware
Haben Sie eine Frage zum Produkt?