|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm54116328 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
040130s2000 caua ob 001 0 eng d |
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d CEF
|d OCLCQ
|d CUSER
|d OCLCE
|d AZU
|d NHM
|d OCLCQ
|d MEAUC
|d UMC
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d AU@
|d WYU
|d VT2
|d OCLCQ
|d OCLCO
|d CNCEN
|d ERF
|d UKBTH
|d LDP
|d UAB
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 84551552
|a 326948944
|a 606432663
|a 607824234
|a 729550725
|a 748108434
|a 759513473
|a 809691376
|a 1056396425
|a 1060979494
|a 1062890873
|a 1074323507
|a 1100830316
|a 1103281096
|a 1105805249
|a 1112552332
|a 1129376039
|a 1156832968
|a 1179125791
|a 1202565104
|a 1240520127
|
020 |
|
|
|z 1565927680
|q (pbk.)
|
020 |
|
|
|z 9781565927681
|q (pbk.)
|
024 |
8 |
|
|a 1565927680
|
029 |
1 |
|
|a AU@
|b 000067101582
|
029 |
1 |
|
|a HEBIS
|b 291459587
|
035 |
|
|
|a (OCoLC)54116328
|z (OCoLC)84551552
|z (OCoLC)326948944
|z (OCoLC)606432663
|z (OCoLC)607824234
|z (OCoLC)729550725
|z (OCoLC)748108434
|z (OCoLC)759513473
|z (OCoLC)809691376
|z (OCoLC)1056396425
|z (OCoLC)1060979494
|z (OCoLC)1062890873
|z (OCoLC)1074323507
|z (OCoLC)1100830316
|z (OCoLC)1103281096
|z (OCoLC)1105805249
|z (OCoLC)1112552332
|z (OCoLC)1129376039
|z (OCoLC)1156832968
|z (OCoLC)1179125791
|z (OCoLC)1202565104
|z (OCoLC)1240520127
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.76.O63
|b N65 2001
|
082 |
0 |
4 |
|a 005.4/4769
|2 21
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Norberg, Stefan.
|
245 |
1 |
0 |
|a Securing Windows NT/2000 servers for the internet /
|c Stefan Norberg.
|
260 |
|
|
|a Sebastopol, CA :
|b O'Reilly,
|c ©2001.
|
300 |
|
|
|a 1 online resource (xiv, 199 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Windows NT/2000 Security -- Building a Windows NT Bastion Host -- Building a Windows 2000 Bastion Host -- Setting Up Secure Remote Administration -- Backing Up and Restoring Your Bastion Host -- Auditing and Monitoring Your Perimeter Network -- Maintaining Your Perimeter Network -- Well-Known Ports Used by Windows NT/2000 -- Security-Related Knowledge Base Articles -- Build Instructions for OpenSSH on Cygwin.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
520 |
|
|
|a In recent years, Windows NT and Windows 2000 systems have emerged as viable platforms for Internet servers. More and more organizations are now entrusting the full spectrum of business activities--including e-commerce--to Windows. Unfortunately, the typical Windows NT/2000 installation makes a Windows server an easy target for attacks, and configuring Windows for secure Internet use is a complex task. Securing Windows NT/2000 Servers for the Internet suggests a two-part strategy to accomplish the task: "Hardening" any Windows server that could potentially be exposed to attacks from the Internet, so the exposed system (known as a "bastion host") is as secure as it can be. Providing extra security protection for exposed systems by installing an additional network (known as a "perimeter network") that separates the Internet from an organization's internal networks. Introduction--Windows NT/2000 security threats, architecture of the Windows NT/2000 operating system and typical perimeter networks. How to build a Windows NT bastion host. Configuring Windows and network services, encrypting the password database, editing the registry, setting system policy characteristics, performing TCP/IP configuration, configuring administrative tools, and setting necessary permissions. Differences between Windows NT and Windows 2000 security including IPSec (IP Security Protocol) configuration. Secure remote administration--SSH, OpenSSH, TCP Wrappers, the Virtual Network Console, and the new Windows 2000 Terminal Services. Windows NT/2000 backup, recovery, auditing, and monitoring--event logs, the audit policy, time synchronization with NTP (Network Time Protocol), remote logging, integrity checking, and intrusion detection. Securing Windows NT/2000 Servers for the Internet is a concise guide that pares down installation and configuration instructions into a series of checklists aimed at Windows administrators. Topics include: Administrators who carefully follow the detailed instructions provided in this book will dramatically increase the security of their Windows NT/2000 Internet servers
|
542 |
|
|
|f Copyright © O'Reilly Media, Incorporated.
|
542 |
|
|
|f Copyright © O'Reilly Media, Inc.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Microsoft Windows NT server.
|
630 |
0 |
7 |
|a Microsoft Windows NT server
|2 fast
|
650 |
|
0 |
|a Operating systems (Computers)
|
650 |
|
0 |
|a Internet.
|
650 |
|
2 |
|a Internet
|
650 |
|
4 |
|a Engineering & Applied Sciences.
|
650 |
|
4 |
|a Computer Science.
|
650 |
|
6 |
|a Systèmes d'exploitation (Ordinateurs)
|
650 |
|
6 |
|a Internet.
|
650 |
|
7 |
|a operating systems.
|2 aat
|
650 |
|
7 |
|a Internet.
|2 aat
|
650 |
|
7 |
|a Internet
|2 fast
|
650 |
|
7 |
|a Operating systems (Computers)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Norberg, Stefan.
|t Securing Windows NT/2000 servers for the internet.
|d Sebastopol, CA : O'Reilly, ©2001
|z 1565927680
|w (DLC) 00053026
|w (OCoLC)45304296
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/1565927680/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|