Cover image for Windows 2000 Security.
Windows 2000 Security.
Title:
Windows 2000 Security.
Author:
Gupta, Rashi.
Personal Author:
Physical Description:
1 online resource (528 pages)
Contents:
Contents -- Introduction -- PART I: WINDOWS 2000 SECURITY- AN OVERVIEW -- Chapter 1 Need for Security -- What Is at Risk? -- Purpose of Security -- Types of Attackers -- Security Threats -- Windows 2000 Core Security Features-A Primer -- Windows 2000 Security Model -- Summary -- Check Your Understanding -- Chapter 2 Introducing Windows 2000 Security -- Active Directory -- Authentication -- Accessing Network Resources -- Configuration Management -- Data Encryption -- Public Key Infrastructure -- Summary -- PART II: AN INSIGHT INTO WINDOWS 2000 SECURITY FEATURES -- Chapter 3 Authentication -- Introduction to Authentication -- Kerberos V5 Authentication Protocol -- Security Support Provider -- Other Authentication Protocols -- Summary -- Check Your Understanding -- Chapter 4 Authorization and Access Control -- An Overview of Windows 2000 Access Control -- Configuring Access Control Permissions -- Encryption File System -- Securing the Print Resource -- Summary -- Check Your Understanding -- Chapter 5 Security Policies -- Group Policy-An Overview -- Group Policy Processing -- Using Group Policy Tools -- Windows 2000 Security Templates-An Overview -- Summary -- Check Your Understanding -- PART III: NETWORK SECURITY -- Chapter 6 Public Key Infrastructure -- What Is Public Key Cryptography? -- Windows 2000 PKI -- Summary -- Check Your Understanding -- Chapter 7 Network Services -- DNS: An Overview -- DHCP: An Overview -- SNMP -- RIS -- Terminal Services -- Summary -- Check Your Understanding -- Chapter 8 Internet Security -- IPSec -- Firewalls -- Summary -- Check Your Understanding -- Chapter 9 Internet Information Server (IIS) -- IIS: An Overview -- IIS Authentication -- Access Control -- Summary -- Check Your Understanding -- Chapter 10 Remote Access and VPN -- Remote Access Services -- Virtual Private Networking -- IAS -- Summary.

Check Your Understanding -- PART IV: OTHER SECURITY FEATURES -- Chapter 11 Reliability Features of Windows 2000 -- Diagnostic Tools -- Windows File Protection Feature -- Fault Tolerance -- Backup -- System Recovery -- Summary -- Check Your Understanding -- Chapter 12 Securing Non-Microsoft Clients -- Securing Access to UNIX Clients -- Securing Access with NetWare -- Securing Access with Macintosh Clients -- Summary -- Check Your Understanding -- PART V: APPENDIXES -- Appendix A: Best Practices -- Auditing -- Securing CAs -- EFS -- Security Configuration and Analysis -- Security Templates -- Acess Control -- Active Directory -- Group Policy -- Software Installation and Management -- Folder Redirection -- Distributed File System (Dfs) -- Network and Dial-up Connections -- TCP/IP Protocol -- DNS -- Server Best Practices -- DHCP -- Internet Authentication Services -- Remote Access Server -- VPNs -- IPSec Policy -- Disk Management -- Backing Up and Restoring Data -- Fault Tolerance -- Disaster Recovery -- Network Monitor -- Performance Monitoring -- Disk Fragmenter -- Appendix B: FAQs -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- X -- Y -- Z.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: