Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks.
The text is divided into six chapters that cover details about network attacks, system failures, audits, and social networking. The book introduces general security concepts including the principles of information security, standards, regulation, and compliance; authentication, authorization, and accounting; and access control. It also covers the cryptography and the principles of network, system, and organizational and operational security, including risk analysis and disaster recovery. The last part of the book presents assessments and audits of information security, which involve methods of testing, monitoring, logging, and auditing.
This handy guide offers IT practitioners, systems and network administrators, and graduate and undergraduate students in information technology the details they need about security concepts and issues. Non-experts or beginners in Windows systems security will also find this book helpful.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter 2 Cryptography
Chapter 3 Network Security
Chapter 4 System Security
Chapter 5 Organizational and Operational Security
Other editions - View all
Access Control Active Directory Add roles Wizard administrator allows antivirus applet application attacker auditing authentication biometric botnet browser Certificate Authority Click client company’s confidential configure connection cryptography Data Collector Set default devices digital signature disabled Disk domain e-mail encryption ensure environment Event Viewer files Firefox hardware hashing hypervisors implement information security installed Internet Explorer IP addresses IPSec Kerberos key algorithms layer LDAP macros messages methods operating system option OSI model password perform port private key privilege escalation programs protect Protocol RADIUS Remote Desktop Resource Monitor restore rootkits security policy seen in Figure shown in Figure snap-in someone specific standard symmetric symmetric key algorithms system security TACACS Ticket-Granting tion trust types usage User Account Control user accounts viruses VPNs vulnerabilities Windows Server 2008 Windows System Windows Update wireless networks