Microsoft Windows security : essentials /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Wiley,
©2011.
|
Colección: | Serious skills.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn747412541 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 110727s2011 inua o 001 0 eng d | ||
010 | |z 2011283166 | ||
040 | |a E7B |b eng |e pn |c E7B |d OCLCQ |d YDXCP |d COO |d N$T |d B24X7 |d S4S |d TEFOD |d OCLCQ |d DEBSZ |d OCLCQ |d OCLCF |d CUY |d CAUOI |d NLGGC |d OCLCO |d UMI |d C6I |d VT2 |d DKDLA |d UKDOC |d OCLCO |d TEFOD |d EBLCP |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d AZK |d CNNOR |d MOR |d PIFAG |d ZCU |d LIV |d MERUC |d OCLCQ |d U3W |d STF |d WRM |d CEF |d NRAMU |d ICG |d INT |d OCLCQ |d WYU |d OCLCQ |d UAB |d A6Q |d DKC |d AU@ |d OCLCQ |d HS0 |d OCL |d OCLCQ |d VLY |d BRF |d UKCRE |d UKBTH |d UHL |d INARC |d UKAHL |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 772189803 |a 799820119 |a 803433381 |a 961555917 |a 962625803 |a 978676681 |a 978908573 |a 988519968 |a 991916957 |a 1037915488 |a 1038685967 |a 1038702856 |a 1045439925 |a 1055332092 |a 1081185754 |a 1083564269 |a 1103252938 |a 1129356284 |a 1153043235 |a 1162263672 |a 1192340320 |a 1228586002 |a 1233068715 |a 1240507822 |a 1244029080 |a 1290117173 | ||
020 | |a 9781118114575 |q (electronic bk.) | ||
020 | |a 1118114574 |q (electronic bk.) | ||
020 | |a 9781118114568 |q (electronic bk.) | ||
020 | |a 1118114566 |q (electronic bk.) | ||
020 | |a 9781118114544 |q (electronic bk.) | ||
020 | |a 111811454X |q (electronic bk.) | ||
020 | |z 9781118016848 |q (pbk.) | ||
020 | |z 111801684X |q (pbk.) | ||
020 | |a 1283177250 | ||
020 | |a 9781283177252 | ||
020 | |a 9786613177254 | ||
020 | |a 6613177253 | ||
029 | 1 | |a AU@ |b 000050968259 | |
029 | 1 | |a AU@ |b 000053024207 | |
029 | 1 | |a AU@ |b 000062340725 | |
029 | 1 | |a CHNEW |b 000614300 | |
029 | 1 | |a DEBBG |b BV044154450 | |
029 | 1 | |a DEBSZ |b 367964716 | |
029 | 1 | |a DEBSZ |b 37288542X | |
029 | 1 | |a DEBSZ |b 430990383 | |
035 | |a (OCoLC)747412541 |z (OCoLC)772189803 |z (OCoLC)799820119 |z (OCoLC)803433381 |z (OCoLC)961555917 |z (OCoLC)962625803 |z (OCoLC)978676681 |z (OCoLC)978908573 |z (OCoLC)988519968 |z (OCoLC)991916957 |z (OCoLC)1037915488 |z (OCoLC)1038685967 |z (OCoLC)1038702856 |z (OCoLC)1045439925 |z (OCoLC)1055332092 |z (OCoLC)1081185754 |z (OCoLC)1083564269 |z (OCoLC)1103252938 |z (OCoLC)1129356284 |z (OCoLC)1153043235 |z (OCoLC)1162263672 |z (OCoLC)1192340320 |z (OCoLC)1228586002 |z (OCoLC)1233068715 |z (OCoLC)1240507822 |z (OCoLC)1244029080 |z (OCoLC)1290117173 | ||
037 | |a CL0500000120 |b Safari Books Online | ||
037 | |a FD8F2E01-6E28-4587-BDAD-75C627C3BEC5 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.3 |b .G53 2011eb | |
072 | 7 | |a COM |x 020000 |2 bisacsh | |
072 | 7 | |a COM |x 043060 |2 bisacsh | |
082 | 0 | 4 | |a 004.6/076 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Gibson, Darril. | |
245 | 1 | 0 | |a Microsoft Windows security : |b essentials / |c Darril Gibson. |
260 | |a Indianapolis, Ind. : |b Wiley, |c ©2011. | ||
300 | |a 1 online resource (xxiv, 347 pages) : |b color illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 1 | |a Sybex serious skills | |
520 | 8 | |a Annotation |b Windows security concepts and technologies for IT beginnersIT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content. Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skillsOffers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and moreReviews all the topics you need to know for taking the MTA 98-367 examProvides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and serversIf you're new to IT and interested in entering the IT workforce, then Microsoft Windows Security Essentials is essential reading. | |
588 | 0 | |a Print version record. | |
505 | 0 | |a Microsoft Windows Security Essentials -- Introduction -- Who Should Read This Book -- What You Will Learn -- Prerequisites -- What You Need -- What Is Covered in This Book -- Chapter 1: Understanding Core Security Principles -- Understanding Risk -- Exploring the Security Triad -- Protecting Against Loss of Confidentiality -- Protecting Against Loss of Availability -- Protecting Against Loss of Integrity -- Implementing a Defense-in-Depth SecurityÂStrategy -- Enforcing the Principle of Least Privilege -- Hardening a Server -- Reducing the Attack Surface -- Keeping a System Updated -- Enabling the Firewall -- Installing Antivirus Software -- Chapter 2: Understanding Malware and SocialÂEngineering -- Comparing Malware -- Viruses -- Worms -- Trojan Horses -- Buffer-Overflow Attacks -- Spyware -- Understanding the Threat -- Protecting Against Malware -- Using Antivirus Software -- Using Microsoft Security Essentials on Desktops -- Thwarting Social-Engineering Attacks -- Social Engineering in Person -- Social Engineering with a Phone Call -- Recognizing Phishing Attempts -- Recognizing Pharming -- Protecting Email -- Chapter 3: Understanding User Authentication -- Comparing the Three Factors ofÂAuthentication -- Using Passwords for Authentication -- Comparing Password Attack Methods -- Creating Strong Passwords -- Enforcing Strong Passwords -- Exploring Account Lockout Policies -- Unlocking an Account -- Resetting a Password -- Changing a Password -- Creating a Password-Reset Disk -- Using Smart Cards and Token Devices forÂAuthentication -- Using Biometrics for Authentication -- Starting Applications with RunÂAsÂAdministrator -- Preventing Time Skew with Kerberos -- Identifying RADIUS Capabilities -- Identifying Unsecure AuthenticationÂProtocols -- LM -- NTLM (NTLMv1) -- Chapter 4: Securing Access withÂPermissions -- Comparing NTFS Permissions. | |
505 | 8 | |a Identifying Basic NTFS Permissions -- Identifying Advanced NTFS Permissions -- Combining Permissions -- Enabling and Disabling Permission Inheritance -- Moving and Copying Files -- Comparing NTFS and FAT -- Exploring Share Permissions -- Identifying Share Permissions -- Combining NTFS and Share Permissions -- Identifying Active Directory Permissions -- Viewing Active Directory Users and Computers -- Comparing NTFS and ActiveÂDirectoryÂPermissions -- Viewing Active Directory Permissions -- Assigning Registry Permissions -- Chapter 5: Using Audit Policies and Network Auditing -- Exploring Audit Policies -- Exploring Object Access Auditing -- Comparing Account Logon and Logon Events -- Exploring Directory Service Access Auditing -- Understanding Account Management Auditing -- Understanding System Events Auditing -- Understanding Privilege Use Auditing -- Understanding Policy Change Auditing -- Understanding Process Tracking -- Enabling Auditing -- Enabling Object Access Auditing -- Enabling Directory Service Access Auditing -- Viewing Audit Information -- Managing Security Logs -- Saving Audit Information -- Securing Audit Information -- Auditing a Network with MBSA -- Installing MBSA -- Running MBSA -- Chapter 6: Protecting Clients and Servers -- Understanding User Account Control -- Understanding the Dimmed Desktop -- Modifying User Account Control -- Keeping Systems Updated -- Updating Systems with Automatic Updates -- Updating Systems with WSUS or SCCM -- Using Group Policy to Configure Clients -- Protecting Clients -- Understanding Offline Folders -- Encrypting Offline Folders -- Using Software-Restriction Policies -- Protecting Servers -- Using Separate VLANs -- Separating Services -- Using Read-Only Domain Controllers -- Exploring DNS Security Issues -- Protecting Against Email Spoofing withÂSPFÂRecords -- Understanding Dynamic Updates. | |
505 | 8 | |a Using Secure Dynamic Updates -- Chapter 7: Protecting a Network -- Identifying Common Attack Methods -- Denial of Service -- Distributed Denial of Service -- Sniffing Attack -- Spoofing Attack -- Port Scan -- Exploring Firewalls -- Comparing Hardware-Based and Software-BasedÂFirewalls -- Comparing UTMs and SCMs -- Isolating Servers on Perimeter Networks -- Using Honeypots -- Isolating a Network with NAT -- Exploring Network Access Protection -- Understanding NAP Components -- Evaluating Client Health with VPN Enforcement -- Using Other NAP Enforcement Methods -- Identifying NAP Requirements -- Identifying Protocol Security Methods -- IPsec -- Comparing Tunneling Protocols -- DNSSEC -- Chapter 8: Understanding Wireless Security -- Comparing Wireless Devices -- Wireless Adapters -- Wireless Access Points -- Wireless Routers -- Comparing Wireless Security Methods -- Understanding Encryption Keys -- Wired Equivalent Privacy -- Wi-Fi Protected Access -- Wi-Fi Protected Access Version 2 -- Extended Authentication Protocol -- Viewing Windows 7 Wireless Settings -- Configuring Wireless Routers -- Changing the Default Administrator Password -- Changing the SSID -- To Broadcast or Not to Broadcast -- Using MAC Filters -- Configuring Windows 7 for Wireless -- Chapter 9: Understanding Physical Security -- Comparing Site Security and ComputerÂSecurity -- Understanding the Importance of Physical Security -- Controlling Physical Access -- Using Switches Instead of Hubs -- Using Group Policy to Enhance ComputerÂSecurity -- Understanding Default GPOs -- Designing OUs and GPOs to Manage UsersÂandÂComputers -- Creating OUs in a Domain -- Moving Objects into an OU -- Creating GPOs to Manage Users and Computers -- Understanding Security Settings in a GPO -- Disabling Log On Locally with Group Policy -- Controlling Removable Storage Access withÂGroup Policy. | |
546 | |a English. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Electronic data processing personnel |x Certification |v Study guides. | |
650 | 0 | |a Computer networks |x Examinations |v Study guides. | |
650 | 6 | |a Réseaux d'ordinateurs |x Examens |v Guides de l'étudiant. | |
650 | 7 | |a COMPUTERS |x Data Transmission Systems |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Vendor Specific. |2 bisacsh | |
650 | 7 | |a Computer networks |x Examinations |2 fast | |
650 | 7 | |a Electronic data processing personnel |x Certification |2 fast | |
655 | 7 | |a Study guides |2 fast | |
776 | 0 | 8 | |i Print version: |a Gibson, Darril. |t Microsoft Windows security. |d Indianapolis, Ind. : Wiley, ©2011 |w (DLC) 2011283166 |
830 | 0 | |a Serious skills. | |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781118114575/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=693645 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH21624351 | ||
938 | |a Internet Archive |b INAR |n microsoftwindows0000gibs | ||
938 | |a 123Library |b 123L |n 18483 | ||
938 | |a Books 24x7 |b B247 |n bks00043253 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL4032031 | ||
938 | |a ebrary |b EBRY |n ebr10484740 | ||
938 | |a EBSCOhost |b EBSC |n 382232 | ||
938 | |a YBP Library Services |b YANK |n 12670383 | ||
938 | |a YBP Library Services |b YANK |n 7039660 | ||
994 | |a 92 |b IZTAP |