Cargando…

Microsoft Windows security : essentials /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gibson, Darril
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Wiley, ©2011.
Colección:Serious skills.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_ocn747412541
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 110727s2011 inua o 001 0 eng d
010 |z  2011283166 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d YDXCP  |d COO  |d N$T  |d B24X7  |d S4S  |d TEFOD  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCF  |d CUY  |d CAUOI  |d NLGGC  |d OCLCO  |d UMI  |d C6I  |d VT2  |d DKDLA  |d UKDOC  |d OCLCO  |d TEFOD  |d EBLCP  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d AZK  |d CNNOR  |d MOR  |d PIFAG  |d ZCU  |d LIV  |d MERUC  |d OCLCQ  |d U3W  |d STF  |d WRM  |d CEF  |d NRAMU  |d ICG  |d INT  |d OCLCQ  |d WYU  |d OCLCQ  |d UAB  |d A6Q  |d DKC  |d AU@  |d OCLCQ  |d HS0  |d OCL  |d OCLCQ  |d VLY  |d BRF  |d UKCRE  |d UKBTH  |d UHL  |d INARC  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 772189803  |a 799820119  |a 803433381  |a 961555917  |a 962625803  |a 978676681  |a 978908573  |a 988519968  |a 991916957  |a 1037915488  |a 1038685967  |a 1038702856  |a 1045439925  |a 1055332092  |a 1081185754  |a 1083564269  |a 1103252938  |a 1129356284  |a 1153043235  |a 1162263672  |a 1192340320  |a 1228586002  |a 1233068715  |a 1240507822  |a 1244029080  |a 1290117173 
020 |a 9781118114575  |q (electronic bk.) 
020 |a 1118114574  |q (electronic bk.) 
020 |a 9781118114568  |q (electronic bk.) 
020 |a 1118114566  |q (electronic bk.) 
020 |a 9781118114544  |q (electronic bk.) 
020 |a 111811454X  |q (electronic bk.) 
020 |z 9781118016848  |q (pbk.) 
020 |z 111801684X  |q (pbk.) 
020 |a 1283177250 
020 |a 9781283177252 
020 |a 9786613177254 
020 |a 6613177253 
029 1 |a AU@  |b 000050968259 
029 1 |a AU@  |b 000053024207 
029 1 |a AU@  |b 000062340725 
029 1 |a CHNEW  |b 000614300 
029 1 |a DEBBG  |b BV044154450 
029 1 |a DEBSZ  |b 367964716 
029 1 |a DEBSZ  |b 37288542X 
029 1 |a DEBSZ  |b 430990383 
035 |a (OCoLC)747412541  |z (OCoLC)772189803  |z (OCoLC)799820119  |z (OCoLC)803433381  |z (OCoLC)961555917  |z (OCoLC)962625803  |z (OCoLC)978676681  |z (OCoLC)978908573  |z (OCoLC)988519968  |z (OCoLC)991916957  |z (OCoLC)1037915488  |z (OCoLC)1038685967  |z (OCoLC)1038702856  |z (OCoLC)1045439925  |z (OCoLC)1055332092  |z (OCoLC)1081185754  |z (OCoLC)1083564269  |z (OCoLC)1103252938  |z (OCoLC)1129356284  |z (OCoLC)1153043235  |z (OCoLC)1162263672  |z (OCoLC)1192340320  |z (OCoLC)1228586002  |z (OCoLC)1233068715  |z (OCoLC)1240507822  |z (OCoLC)1244029080  |z (OCoLC)1290117173 
037 |a CL0500000120  |b Safari Books Online 
037 |a FD8F2E01-6E28-4587-BDAD-75C627C3BEC5  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.3  |b .G53 2011eb 
072 7 |a COM  |x 020000  |2 bisacsh 
072 7 |a COM  |x 043060  |2 bisacsh 
082 0 4 |a 004.6/076  |2 23 
049 |a UAMI 
100 1 |a Gibson, Darril. 
245 1 0 |a Microsoft Windows security :  |b essentials /  |c Darril Gibson. 
260 |a Indianapolis, Ind. :  |b Wiley,  |c ©2011. 
300 |a 1 online resource (xxiv, 347 pages) :  |b color illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a Sybex serious skills 
520 8 |a Annotation  |b Windows security concepts and technologies for IT beginnersIT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content. Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skillsOffers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and moreReviews all the topics you need to know for taking the MTA 98-367 examProvides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and serversIf you're new to IT and interested in entering the IT workforce, then Microsoft Windows Security Essentials is essential reading. 
588 0 |a Print version record. 
505 0 |a Microsoft Windows Security Essentials -- Introduction -- Who Should Read This Book -- What You Will Learn -- Prerequisites -- What You Need -- What Is Covered in This Book -- Chapter 1: Understanding Core Security Principles -- Understanding Risk -- Exploring the Security Triad -- Protecting Against Loss of Confidentiality -- Protecting Against Loss of Availability -- Protecting Against Loss of Integrity -- Implementing a Defense-in-Depth SecurityÂStrategy -- Enforcing the Principle of Least Privilege -- Hardening a Server -- Reducing the Attack Surface -- Keeping a System Updated -- Enabling the Firewall -- Installing Antivirus Software -- Chapter 2: Understanding Malware and SocialÂEngineering -- Comparing Malware -- Viruses -- Worms -- Trojan Horses -- Buffer-Overflow Attacks -- Spyware -- Understanding the Threat -- Protecting Against Malware -- Using Antivirus Software -- Using Microsoft Security Essentials on Desktops -- Thwarting Social-Engineering Attacks -- Social Engineering in Person -- Social Engineering with a Phone Call -- Recognizing Phishing Attempts -- Recognizing Pharming -- Protecting Email -- Chapter 3: Understanding User Authentication -- Comparing the Three Factors ofÂAuthentication -- Using Passwords for Authentication -- Comparing Password Attack Methods -- Creating Strong Passwords -- Enforcing Strong Passwords -- Exploring Account Lockout Policies -- Unlocking an Account -- Resetting a Password -- Changing a Password -- Creating a Password-Reset Disk -- Using Smart Cards and Token Devices forÂAuthentication -- Using Biometrics for Authentication -- Starting Applications with RunÂAsÂAdministrator -- Preventing Time Skew with Kerberos -- Identifying RADIUS Capabilities -- Identifying Unsecure AuthenticationÂProtocols -- LM -- NTLM (NTLMv1) -- Chapter 4: Securing Access withÂPermissions -- Comparing NTFS Permissions. 
505 8 |a Identifying Basic NTFS Permissions -- Identifying Advanced NTFS Permissions -- Combining Permissions -- Enabling and Disabling Permission Inheritance -- Moving and Copying Files -- Comparing NTFS and FAT -- Exploring Share Permissions -- Identifying Share Permissions -- Combining NTFS and Share Permissions -- Identifying Active Directory Permissions -- Viewing Active Directory Users and Computers -- Comparing NTFS and ActiveÂDirectoryÂPermissions -- Viewing Active Directory Permissions -- Assigning Registry Permissions -- Chapter 5: Using Audit Policies and Network Auditing -- Exploring Audit Policies -- Exploring Object Access Auditing -- Comparing Account Logon and Logon Events -- Exploring Directory Service Access Auditing -- Understanding Account Management Auditing -- Understanding System Events Auditing -- Understanding Privilege Use Auditing -- Understanding Policy Change Auditing -- Understanding Process Tracking -- Enabling Auditing -- Enabling Object Access Auditing -- Enabling Directory Service Access Auditing -- Viewing Audit Information -- Managing Security Logs -- Saving Audit Information -- Securing Audit Information -- Auditing a Network with MBSA -- Installing MBSA -- Running MBSA -- Chapter 6: Protecting Clients and Servers -- Understanding User Account Control -- Understanding the Dimmed Desktop -- Modifying User Account Control -- Keeping Systems Updated -- Updating Systems with Automatic Updates -- Updating Systems with WSUS or SCCM -- Using Group Policy to Configure Clients -- Protecting Clients -- Understanding Offline Folders -- Encrypting Offline Folders -- Using Software-Restriction Policies -- Protecting Servers -- Using Separate VLANs -- Separating Services -- Using Read-Only Domain Controllers -- Exploring DNS Security Issues -- Protecting Against Email Spoofing withÂSPFÂRecords -- Understanding Dynamic Updates. 
505 8 |a Using Secure Dynamic Updates -- Chapter 7: Protecting a Network -- Identifying Common Attack Methods -- Denial of Service -- Distributed Denial of Service -- Sniffing Attack -- Spoofing Attack -- Port Scan -- Exploring Firewalls -- Comparing Hardware-Based and Software-BasedÂFirewalls -- Comparing UTMs and SCMs -- Isolating Servers on Perimeter Networks -- Using Honeypots -- Isolating a Network with NAT -- Exploring Network Access Protection -- Understanding NAP Components -- Evaluating Client Health with VPN Enforcement -- Using Other NAP Enforcement Methods -- Identifying NAP Requirements -- Identifying Protocol Security Methods -- IPsec -- Comparing Tunneling Protocols -- DNSSEC -- Chapter 8: Understanding Wireless Security -- Comparing Wireless Devices -- Wireless Adapters -- Wireless Access Points -- Wireless Routers -- Comparing Wireless Security Methods -- Understanding Encryption Keys -- Wired Equivalent Privacy -- Wi-Fi Protected Access -- Wi-Fi Protected Access Version 2 -- Extended Authentication Protocol -- Viewing Windows 7 Wireless Settings -- Configuring Wireless Routers -- Changing the Default Administrator Password -- Changing the SSID -- To Broadcast or Not to Broadcast -- Using MAC Filters -- Configuring Windows 7 for Wireless -- Chapter 9: Understanding Physical Security -- Comparing Site Security and ComputerÂSecurity -- Understanding the Importance of Physical Security -- Controlling Physical Access -- Using Switches Instead of Hubs -- Using Group Policy to Enhance ComputerÂSecurity -- Understanding Default GPOs -- Designing OUs and GPOs to Manage UsersÂandÂComputers -- Creating OUs in a Domain -- Moving Objects into an OU -- Creating GPOs to Manage Users and Computers -- Understanding Security Settings in a GPO -- Disabling Log On Locally with Group Policy -- Controlling Removable Storage Access withÂGroup Policy. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Electronic data processing personnel  |x Certification  |v Study guides. 
650 0 |a Computer networks  |x Examinations  |v Study guides. 
650 6 |a Réseaux d'ordinateurs  |x Examens  |v Guides de l'étudiant. 
650 7 |a COMPUTERS  |x Data Transmission Systems  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Vendor Specific.  |2 bisacsh 
650 7 |a Computer networks  |x Examinations  |2 fast 
650 7 |a Electronic data processing personnel  |x Certification  |2 fast 
655 7 |a Study guides  |2 fast 
776 0 8 |i Print version:  |a Gibson, Darril.  |t Microsoft Windows security.  |d Indianapolis, Ind. : Wiley, ©2011  |w (DLC) 2011283166 
830 0 |a Serious skills. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118114575/?ar  |z Texto completo 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=693645  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH21624351 
938 |a Internet Archive  |b INAR  |n microsoftwindows0000gibs 
938 |a 123Library  |b 123L  |n 18483 
938 |a Books 24x7  |b B247  |n bks00043253 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4032031 
938 |a ebrary  |b EBRY  |n ebr10484740 
938 |a EBSCOhost  |b EBSC  |n 382232 
938 |a YBP Library Services  |b YANK  |n 12670383 
938 |a YBP Library Services  |b YANK  |n 7039660 
994 |a 92  |b IZTAP