Securing Windows NT/2000
From Policies to Firewalls
Seiten
2002
Auerbach (Verlag)
978-0-8493-1261-8 (ISBN)
Auerbach (Verlag)
978-0-8493-1261-8 (ISBN)
Offers an overview of how to develop a strategy to implement security within an organization. This managerial and practical technical tutorial for Windows NT/2000 presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet.
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.
The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The book includes the steps required to define a corporate security policy, how to implement that policy, and how to structure the project plan. Tables, charts, and work templates provide a starting point to begin assessing and implementing a solution that will fit the unique needs of your organization. Part two provides the reader with practical hands-on applications for the preparation, installation, and tuning of Windows NT/2000 operating systems.
Securing Windows NT/2000 provides step-by-step instructions that guide you through performing a secure installation and in preparing the system for secure operation on the Internet. Although a multitude of firewall application software can be used in conjunction with the sections detailing the securing of the operating system, Check Point FireWall-1/VPN-1 is used as it best demonstrates the effectiveness of translating the corporate security policy into a practical reality.
About the Author:
Michael Simonyi (www.stonewallem.com) is an IT professional working for private sector enterprise organizations. He has over 12 years of practical and theoretical experience, from mainframe systems to PC client/server networks. His areas of expertise center on practical systems management, networking, databases, and application architecture, with emphasis on quality.
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.
The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The book includes the steps required to define a corporate security policy, how to implement that policy, and how to structure the project plan. Tables, charts, and work templates provide a starting point to begin assessing and implementing a solution that will fit the unique needs of your organization. Part two provides the reader with practical hands-on applications for the preparation, installation, and tuning of Windows NT/2000 operating systems.
Securing Windows NT/2000 provides step-by-step instructions that guide you through performing a secure installation and in preparing the system for secure operation on the Internet. Although a multitude of firewall application software can be used in conjunction with the sections detailing the securing of the operating system, Check Point FireWall-1/VPN-1 is used as it best demonstrates the effectiveness of translating the corporate security policy into a practical reality.
About the Author:
Michael Simonyi (www.stonewallem.com) is an IT professional working for private sector enterprise organizations. He has over 12 years of practical and theoretical experience, from mainframe systems to PC client/server networks. His areas of expertise center on practical systems management, networking, databases, and application architecture, with emphasis on quality.
Michael A. Simonyi
Management / Executive Overview. What is Security? Defining a Corporate Security Policy. Implementing the Security Policy. Perimeter Security Scenarios. Future Directions in Security Planning. Corporate Security Requirements for Conducting Business on the Internet. Putting the Puzzle Together. Fortifying the Environment.
Zusatzinfo | 61 Illustrations, black and white |
---|---|
Verlagsort | London |
Sprache | englisch |
Maße | 178 x 254 mm |
Gewicht | 588 g |
Themenwelt | Informatik ► Betriebssysteme / Server ► Windows |
Informatik ► Betriebssysteme / Server ► Windows Server | |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-8493-1261-2 / 0849312612 |
ISBN-13 | 978-0-8493-1261-8 / 9780849312618 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Insider-Wissen – praxisnah & kompetent
Buch | Hardcover (2023)
dpunkt (Verlag)
44,90 €