Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: Basic Windows 2000 Security: Using Security Templates
Head of the Class…
Active Directory: It's Just a Big Database
Head of the Class…
Group Policy Security Versus Security Templates
Damage & Defense…
Password Age Policies
Notes from the Underground…
Brute-Force Attacks
Damage & Defense…
Shutting Out Hackers
Damage & Defense…
Safety First!
Chapter 2: Advanced Security Template and Group Policy Issues
Notes from the Underground…
Buffer Overrun Heaven
Damage & Defense…
The Importance of Updating IIS
Head of the Class…
Watch Where You Assign Blame
Head of the Class…
Protect That Laptop
Chapter 3: Identifying, Installing, and Troubleshooting Required Updates
Damage & Defense…
Get Those Hotfixes!
Notes from the Underground…
You're Not Alone
Head of the Class…
Test, Backup, Deploy
Chapter 4: Installing, Configuring, & Managing Windows 2000 Certificate Authorities
Head of the Class…
The Need for Stand-alone CAs
Damage & Defense…
Revoke Those Certificates
Notes from the Underground…
Nothing in Life Is Perfect
Chapter 5: Managing and Troubleshooting the Encrypting File System
Head of the Class…
Public Key Cryptography
Damage & Defense…
Encryption Does Not Apply to Diskettes
Notes from the Underground…
Watch the Recovery Agents!
Head of the Class…
The EFS Callback Functions
Chapter 6: Configuring and Troubleshooting Windows IP Security
Damage & Defense…
The Importance of Password Policies
Notes from the Underground…
Nothing in Life Is Perfect
Head of the Class…
IPSec Finer Points
Chapter 7: Implementing Secure Wireless Networks
Head of the Class…
So What Are 802.1x and 802.11x, Exactly?
Damage & Defense…
Preventing Dictionary Attacks Using EAP
Head of the Class…
The Legal Status of War Driving and Responsibility of Wireless Network Owners and Operators
Notes from the Underground…
MAC Spoofing
Head of the Class…
More Information on WEP
Chapter 8: Configuring Secure Network and Internet Authentication Methods
Damage & Defense…
No Replay Here
Notes from the Underground…
Safe Kerberos
Head of the Class…
Verifying Your Encryption Level
Head of the Class…
Allow IIS to Control Password
Chapter 9: Configuring and Troubleshooting Remote Access and VPN Authentication
Head of the Class…
Hash: Not Just for Breakfast Anymore
Head of the Class…
RAS versus RRAS: What's the Difference?
Notes from the Underground…
Identify Remote Users
Head of the Class…
Why Do We Need to Worry About an RAS Server? No One Uses Them Anymore, Right?
Damage & Defense…
Considerations for L2TP Ports
Damage & Defense…
NAT and the End User's Home Network
Chapter 10: Configuring and Using Auditing and the Event Logs
Notes from the Underground…
Don't Overdo It
Head of the Class…
Test Your Policies
Damage & Defense…
Auditing and Your Security Policy
Notes from the Underground…
Hack Alert, Hack Alert!
Chapter 11: Responding to and Recovering from Security Breaches
Damage & Defense…
Proactive versus Reactive Security Management
Notes from the Underground…
Back Orifice
Notes from the Underground…
BSOD with SMBdie
Head of the Class…
Forensic Procedures
Previous page
Table of content
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
ISBN: 1931836841
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
Will Schmied
,
Thomas W. Shinder
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 4.1 Authentication with Public Keys
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 4.7 Using Public Key Authentication for Automated File Transfers
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Assessing Business-IT Alignment Maturity
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governing Information Technology Through COBIT
Visual C# 2005 How to Program (2nd Edition)
Summary
Exercises
Exercises
Drawing Arcs
Exercises
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
The Evolution of SOA
Message exchange patterns
Metadata exchange
Agnostic services
SOA platform basics
GO! with Microsoft Office 2003 Brief (2nd Edition)
You and GO!
Business Running Case
Forms and Reports
Objective 1. Create an AutoForm
Objective 5. Create an AutoReport
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Six Things Managers Must Do: How to Support Lean Six Sigma
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies