Flylib.com
Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163
BUY ON AMAZON
Table of Contents
Back Cover
Windows Vista Security-Securing Vista Against Malicious Attacks
Foreword
Introduction
Overview of the Book and Technology
How This Book Is Organized
Who Should Read This Book
Tools You Will Need
What s on the Web Site
Summary
Part I: Introducing Windows Vista
Chapter 1: New Security Features
Improved C Security
Address Space Layout Randomization
Data Execution Protection
Protected Processes
Windows Vista User Experience
Host-Based Security
Securing E-mail and the Internet
Securing Windows Networks
Group Policy
64-bit Only Improvements
Future Improvements
Summary
Best Practices
Chapter 2: How Hackers Attack
Where Windows Malware Hides
Why Malicious Hackers Hack
Summary
Chapter 3: Windows Infrastructure
Post-Boot Startup
Services You Need To Understand
Registry
Logon Authentication
Access Control
Summary
Part II: Host-Based Security
Chapter 4: User Account Control
Basics
The Case for Least Privilege
Admins Are Omnipotent
User Account Control Is More Than You Think
UAC and Remote Access
UAC Policy Configuration
Frequently Asked Questions About UAC
Leveraging User Account Control in Applications
Summary
Best Practices
Chapter 5: Managing Access Control
How an Access Control List Is Used
Major Access Control List Changes in Vista
Tools to Manage Access Control Lists
Registry ACLs
Summary
Best Practices
Chapter 6: Application Security
Restart Manager
ActiveX Installer Service
Antivirus
Desktop Optimization Pack
Summary
Best Practices
Chapter 7: Vista Client Protection
Malicious Software Removal Tool
Security Center
Windows Defender
Windows Live OneCare
Microsoft Forefront Client Security
Should Microsoft Be in the Anti-Malware Business?
Summary
Best Practices
Part III: Securing Internet and E-mail Access
Chapter 8: Securing Internet Explorer
New IE 7.0 Security Features
Internet Explorer Security Settings
Will Internet Explorer 7 Be Hacked A Lot?
Summary
Best Practices
Chapter 9: Introducing IIS 7
Introduction to IIS
New IIS Features
Installing IIS 7
IIS Components
IIS Protocol Listeners
Worker Processes, Application Pools, and Identities
IUSR and IIS_USRS
IIS Administration
IIS Authentication
Web Server Access Control Permissions
Defending IIS
Summary
Chapter 10: Protecting E-mail
Introducing Windows Mail
E-mail Defenses
Summary
Best Practices
Part IV: Securing Windows Networks
Chapter 11: Managing Windows Firewall
New Features
Firewall Management
Summary
Best Practices
Chapter 12: Server and Domain Isolation
Forget About the Perimeter
Network Threat Modeling
Changes in Windows Vista Affecting SDI
Summary
Best Practices
Chapter 13: Wireless Security
Wireless Threats
New Wireless Improvements in Vista
Securing Wireless Networks
Summary
Best Practices
Part V: Group Policy and Best Practices
Chapter 14: Using Group Policy
Updated Group Policy Features
New or Updated Group Policy Settings
Settings That Require Reboot or Logon
Windows Vista Security Guide
Active Directory Schema Updates
Managing Group Policy in a Mixed Environment
Rollout Strategy
Summary
Best Practices
Chapter 15: Thinking about Security
The Three-Step Approach to Security
Wetware
Summary
Best Practices
Appendix A: Building a Windows PE Boot Disk
Downloading WAIK
Building the WinPE Image
Appendix B: References
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P-Q
R
S
T
U
V
W
X-Y
Z
List of Figures
List of Tables
List of Sidebars
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Characters, Strings, and Text Output
Looping Commands
Adding Sound Effects to Your Game
Playing Intro Movies and Cut-Scenes
Appendix A Answers to the Chapter Quizzes
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
SWT Event Handling, Threading, and Displays
Trees
Eclipse Forms
Programming OLE in Windows
Drawing Diagrams with Draw2D
Introduction to 80x86 Assembly Language and Computer Architecture
Representing Data in a Computer
Parts of a Computer System
Elements of Assembly Language
String Operations
Appendix E 80x86 Instructions (by Opcode)
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 30. Monitor Wireless Links in Linux with Wavemon
Hack 53. Do-It-Yourself Access Point Hardware
Hack 69. Extend Your Wireless Network with WDS
Hack 85. Pringles Can Waveguide
Section A.5. 802.16: WiMAX Long Distance Wireless Infrastructure
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Voice of the Customer (VOC)
Data Collection
Variation Analysis
Identifying and Verifying Causes
Complexity Value Stream Mapping and Complexity Analysis
Extending and Embedding PHP
Starting Up and Shutting Down
Configuration and Linking
Array Manipulation
Constants
Streams API
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies