Wednesday, January 23, 2013

Windows Server 2008 Security

Contents at a Glance
Part I Windows Security Fundamentals
1 Subjects, Users, and Other Actors . . . . . . . .3
2 Authenticators and Authentication Protocols. . 17
3 Objects: The Stuff You Want . .. . . . . 55
4 Understanding User Account Control (UAC) . . . . . . . .  . 91
5 Firewall and Network Access Protection . . .. . . .. 115
6 Services . . . . . . . . . . . . . . . 151
7 Group Policy . .  . . . . . . . . . . . . .  . . 183
8 Auditing.  . . . . . . . . . . . . . . . . . . . . 213
Part II Implementing Identity and Access (IDA) Control
Using Active Directory
9 Designing Active Directory Domain Services for Security. . . . . . . . . . 241
10 Implementing Active Directory Certificate Services. . . . . . . . . . . . . . . 265
Part III Common Security Scenarios
11 Securing Server Roles .. . . . . . . . . . . .. . . . 285
12 Patch Management . . . . . . . . . . . . . . . . . . 313
13 Securing the Network . . . . . . . .. . . . . . . . 341
14 Securing the Branch Office.. .  . . . . . . . . . . 369
15 Small Business Considerations .  ..  . . . 391
16 Securing Server Applications . . . . 431.

No comments:

Post a Comment