2020ok  Directory of FREE Online Books and FREE eBooks

Free eBooks > Computers & Internet > Networking > Networks, Protocols & API's > Network Security > Windows 2000 Security Handbook

Windows 2000 Security Handbook

by Philip Cox and Tom Sheldon


Download Book
(Respecting the intellectual property of others is utmost important to us, we make every effort to make sure we only link to legitimate sites, such as those sites owned by authors and publishers. If you have any questions about these links, please contact us.)


link 1



About Book

Book Description
Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with firewalls, proxy servers, and VPNs.

Book Info
(Osborne) Guide to implementing solid security measures in a Windows 2000 system, from preventing threats to the network to customizing administrative control for better access to security information. Shows how to build firewalls and implement authentication policies on VPNs, as well as a number of other security tasks. Softcover.

From the Back Cover

Your practical guide to securing your Windows 2000 network

Implement rock-solid security on your Windows 2000 enterprise network with the expert information in this comprehensive resource. Windows 2000 Security Handbook shows you, step-by-step, how to locate and plug security holes and backdoors, authenticate users, and defend against the latest methods of attack. You'll get in-depth coverage of the all-new security features in Windows 2000 - from Active Directory, Kerveros 5, and smartcards, to IPSec and PKI. Throughout the book, you'll get advice on how to incorporate sound security practices into your daily administrative tasks. The companion web site at www.osborne.com includes bonus content on Microsoft Certificate Services, a listing of Windows 2000 Services and their dependencies, and common protocols and ports used by Windows 2000 Services. Plus, you'll get eight pages of blueprints illustrating the four major factors in building a scalable, robust, and secure Windows 2000 network with proper Active Directory and DNS structure, as well as proper Organizational Unit and Group Policy usage.

  • Understand the threats to your Windows 2000 enterprise network and the appropriate countermeasures
  • Understand Windows 2000-based security mechanisms, and use them to proactively defeat attackers
  • Customize administrative control over your Active Directory with Group Policy, Organizational Units, and delegation
  • Plan and implement countermeasures, such as system patches, defensive configuration, encryption, and intrusion detection methods
  • Provide application-transparent encryption services for IP Traffic with IPSec
  • Establish secure Active Directory domain components, including group and user permissions, OUs, and trust relationships
  • Enable strong authentication with Kerberos 5 and PKI
  • Utilize access control lists and the Encrypting File System to protect access to critical files and objects
  • Build secure firewalls and implement strong authentication policies on VPNs
  • Handle fault tolerance with disk mirroring, disk striping, replication, and RAID arrays


About the Author
Phil Cox (Tracy, CA) is a MCSE forcused on Microsoft NT and UNIX security issues. He is a featured columnist in the USENIX Association Magazine and serves on the editorial board of the SAN NT-digest. Tom Sheldon (Big Sur, CA) has worked as a computer programmer, consultant, and network administrator since the late 1970's. He is the author of several highly acclaimed Osborne books including Encyclopedia of Networking, Electronic Edition, Windows NT Security Handbook, Microsoft Internet Information Server: The Complete Reference, and Windows 98 Made Easy. In the past few ears, Tom has become a recognized networking expert.

Comments

SEND A COMMENT

PLEASE READ: All comments must be approved before appearing in the thread; time and space constraints prevent all comments from appearing. We will only approve comments that are directly related to the article, use appropriate language and are not attacking the comments of others.

Message (please, no HTML tags. Web addresses will be hyperlinked):

Related Free eBooks

Related Tags

DIGG This story   Save To Google   Save To Windows Live   Save To Del.icio.us   diigo it   Save To blinklist
Save To Furl   Save To Yahoo! My Web 2.0   Save To Blogmarks   Save To Shadows   Save To stumbleupon   Save To Reddit