Microsoft Windows Security Fundamentals
โ Scribed by Jan De Clercq and Guido Grillenmeier (Auth.)
- Publisher
- Elsevier Digital Press
- Year
- 2007
- Tongue
- English
- Leaves
- 802
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Content:
Foreword, Page xv
Foreword, Pages xvii-xix
Foreword, Page xxi
Preface, Pages xxiii-xxv
Acknowledgments, Pages xxvii-xxviii
1 - The Challenge of Trusted Security Infrastructures, Pages 3-35
2 - Windows Security Authorities and Principals, Pages 37-108
3 - Windows Trust Relationships, Pages 109-163
4 - Aspects of Windows Client Security, Pages 165-230
5 - Introducing Windows Authentication, Pages 233-301
6 - Kerberos, Pages 303-408
7 - IIS Authentication, Pages 409-476
8 - UNIX/Linux and Windows Authentication Integration, Pages 477-532
9 - Single Sign-On, Pages 533-579
10 - Windows Server 2003 Authorization, Pages 583-691
11 - Active Directory Delegation, Pages 693-772
Index, Pages 773-803
๐ SIMILAR VOLUMES
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to se
Windows security concepts and technologies for IT beginnersIT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks
<b>Windows security concepts and technologies for IT beginners</b><p>IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows secu
Security is not binary. It is not a switch or even a series of switches. It cannot be expressed in absolute terms. Do not believe anyone who tries to convince you otherwise. Security is relative-there is only more secure and less secure. Furthermore, security is dynamic-people, process, and technolo