Contents at a Glance
Part I Windows Security Fundamentals
1 Subjects, Users, and Other Actors . . . . . . . .3
2 Authenticators and Authentication Protocols. . 17
3 Objects: The Stuff You Want . .. . . . . 55
4 Understanding User Account Control (UAC) . . . . . . . . . 91
5 Firewall and Network Access Protection . . .. . . .. 115
6 Services . . . . . . . . . . . . . . . 151
7 Group Policy . . . . . . . . . . . . . . . . . 183
8 Auditing. . . . . . . . . . . . . . . . . . . . . 213
Part II Implementing Identity and Access (IDA) Control
Using Active Directory
9 Designing Active Directory Domain Services for Security. . . . . . . . . . 241
10 Implementing Active Directory Certificate Services. . . . . . . . . . . . . . . 265
Part III Common Security Scenarios
11 Securing Server Roles .. . . . . . . . . . . .. . . . 285
12 Patch Management . . . . . . . . . . . . . . . . . . 313
13 Securing the Network . . . . . . . .. . . . . . . . 341
14 Securing the Branch Office.. . . . . . . . . . . . 369
15 Small Business Considerations . .. . . . 391
16 Securing Server Applications . . . . 431.
No comments:
Post a Comment