Microsoft Windows NT 4.0 Security, Audit, and Control

Microsoft Windows NT 4.0 Security, Audit, and Control
Author: James G. Jumes
Publisher:
Total Pages: 340
Release: 1999
Genre: Computers
ISBN: 9781572318182

"The Microsoft Windows NT 4.0 Security" offers the MIS professional, network architect, administrator, or webmaster a set of guidelines for securing, auditing, and controlling networks running on Windows NT 4.0. A computer security plan that is well thought out, implemented, and monitored makes authorized use of network computers easy and unauthorized use or accidental damage difficult if not impossible. Issues are introduced and explained conceptually, then the reader is walked through tested procedures for establishing a secure installation. Includes 120-day evaluation copy Microsoft Internet Information Server on CD

Windows NT 4.0 Server Security Guide

Windows NT 4.0 Server Security Guide
Author: Marcus Goncalves
Publisher: Prentice Hall
Total Pages: 0
Release: 1998
Genre: Client/server computing
ISBN: 9780136799030

The real scoop on Window NT's notorious security holes!. Giving a blow-by-blow walkthrough of all known security problems in NT 3.51 and 4.1, the book gives detailed preventive measures and curative solutions. The CD-ROM features an exclusive security reference and a comprehensive listing of tools.

Managing Cisco Network Security

Managing Cisco Network Security
Author: Syngress
Publisher: Elsevier
Total Pages: 786
Release: 2002-05-29
Genre: Computers
ISBN: 0080479057

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world "There's no question that attacks on enterprise networks are increasing in frequency and sophistication..." -Mike Fuhrman, Cisco Systems Manager, Security Consulting Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions. Security from a real-world perspective Key coverage of the new technologies offered by the Cisco including: 500 series of Cisco PIX Firewall, Cisco Intrusion Detection System, and the Cisco Secure Scanner Revised edition of a text popular with CCIP (Cisco Certified Internetwork Professional) students Expanded to include separate chapters on each of the security products offered by Cisco Systems

Microsoft Windows NT 3.5

Microsoft Windows NT 3.5
Author: Microsoft Corporation
Publisher:
Total Pages: 312
Release: 1994
Genre: Computers
ISBN:

Designed to help managers, network security specialists, auditors and users to understand the control, security and audit implications of the Microsoft Windows NT Server Operating System. The resource serves as a guide to implementing and audit capabilities of Windows NT 3.5.

Securing Windows NT/2000 Servers for the Internet

Securing Windows NT/2000 Servers for the Internet
Author: Stefan Norberg
Publisher: "O'Reilly Media, Inc."
Total Pages: 222
Release: 2001
Genre: Computers
ISBN: 9781565927681

This concise guide pares down installation and configuration instructions into a series of checklists for Windows administrators. Topics include: Windows NT/2000 security threats, architecture of the Windows NT/2000 operating system and typical perimeter networks, how to build a Windows NT bastion host, and configuring Windows and network services.

Windows NT Security Unleashed

Windows NT Security Unleashed
Author: Robert Crisp
Publisher:
Total Pages: 700
Release: 1997-01-01
Genre: Computer networks
ISBN: 9780672310881

Readers will learn to implement a secure NT network and be aware of potential security holes. This guide explores hackers, viruses and other threats to security, plus measures such as firewalls, backups, and physical security; encryption; Microsoft applications security (IIS, Exchange, etc.); and more. The CD-ROM contains an electronic library.

The Security Development Lifecycle

The Security Development Lifecycle
Author: Michael Howard
Publisher:
Total Pages: 364
Release: 2006
Genre: Computers
ISBN:

Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs--the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL--from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization. Discover how to: Use a streamlined risk-analysis process to find security design issues before code is committed Apply secure-coding best practices and a proven testing process Conduct a final security review before a product ships Arm customers with prescriptive guidance to configure and deploy your product more securely Establish a plan to respond to new security vulnerabilities Integrate security discipline into agile methods and processes, such as Extreme Programming and Scrum Includes a CD featuring: A six-part security class video conducted by the authors and other Microsoft security experts Sample SDL documents and fuzz testing tool PLUS--Get book updates on the Web. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Author: Joel Scambray
Publisher: McGraw Hill Professional
Total Pages: 483
Release: 2007-12-04
Genre: Computers
ISBN: 007149426X

The latest Windows security attack and defense strategies "Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors' and contributors' many years as security professionals hired to break into the world's largest IT infrastructures. Dramatically improve the security of Microsoft technology deployments of all sizes when you learn to: Establish business relevance and context for security by highlighting real-world risks Take a tour of the Windows security architecture from the hacker's perspective, exposing old and new vulnerabilities that can easily be avoided Understand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries, and Google searches to locate vulnerable Windows systems Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniques Prevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle attacks, and cracking vulnerable services See up close how professional hackers reverse engineer and develop new Windows exploits Identify and eliminate rootkits, malware, and stealth software Fortify SQL Server against external and insider attacks Harden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control, the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomization