Hack Proofing Windows 2000 Server
The complete, authoritative guide to protecting your Windows 2000 Network
"Essential reading for your IT security organization." -Deena Joyce, Director of Information Technology and Network Security, Casino Magic
Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5.
A great addition to the bestselling "Hack Proofing..." series
Windows 2000 sales have surpassed those of Windows NT
Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp
Unrivalled web support at firstname.lastname@example.org
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter 4 Secure Networking Using Windows 2000 Distributed Security Services
Chapter 5 Security Configuration Tool Set
Chapter 6 Encrypting the File System for Windows 2000
Chapter 7 IP Security for Microsoft Windows 2000 Server
Chapter 8 Smart Cards
Chapter 9 Microsoft Windows 2000 Public Key Infrastructure
Access Control Active Directory Active Directory Users Administrative Tools algorithm allows application Audit Backup certificate authority choose Click OK client components Configuration and Analysis create cryptographic database decrypt default dialog box digital signature domain controller empty membership Encrypting File System Event Log filter Group Policy GSNW hash implementation installation interface Internet IPSec Kerberos key pair logon machine Manager Microsoft NetWare NTFS NTLM object operating system password permissions Power Users private key provides public key Read & Execute Registry request Right-click Root certificate running secret key Security Configuration security policy security settings Select Services for UNIX session key session ticket setup shown in Figure smart card syntax telnet trust udp Unassigned user account user’s username Users and Computers windir window shown Windows 2000 domain Windows 2000 Server Windows 9x Windows NT 4.0 Wizard
Page v - Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Jackie Gross, Gayle Voycey, Alexia Penny, Anik Robitaille, Craig Siddall, Darlene Morrow...
Page v - FridaYara of Publishers Group West for sharing their incredible marketing experience and expertise. Mary Ging, Caroline Hird, Simon Beale, Caroline Wheeler, Victoria Fuller, Jonathan Bunkell, and Klaus Beran of Harcourt International for making certain that our vision remains worldwide in scope.
Page i - With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening. Readers like yourself have been telling us they want an Internet-based service that would extend and enhance the value of our books. Based on reader feedback and our own strategic plan, we have created a Web site that we hope will exceed your expectations. Solutions@syngress.com is an...