Microsoft Windows NT 4.0 Security, Audit, and Control
Title | Microsoft Windows NT 4.0 Security, Audit, and Control PDF eBook |
Author | James G. Jumes |
Publisher | |
Pages | 318 |
Release | 1998 |
Genre | |
ISBN |
Microsoft Windows NT 4.0 Security, Audit, and Control
Title | Microsoft Windows NT 4.0 Security, Audit, and Control PDF eBook |
Author | James G. Jumes |
Publisher | |
Pages | 340 |
Release | 1999 |
Genre | Computers |
ISBN | 9781572318182 |
"The Microsoft Windows NT 4.0 Security" offers the MIS professional, network architect, administrator, or webmaster a set of guidelines for securing, auditing, and controlling networks running on Windows NT 4.0. A computer security plan that is well thought out, implemented, and monitored makes authorized use of network computers easy and unauthorized use or accidental damage difficult if not impossible. Issues are introduced and explained conceptually, then the reader is walked through tested procedures for establishing a secure installation. Includes 120-day evaluation copy Microsoft Internet Information Server on CD
PC Week Microsoft Windows NT Security
Title | PC Week Microsoft Windows NT Security PDF eBook |
Author | Nevin Lambert |
Publisher | |
Pages | 420 |
Release | 1997 |
Genre | Computers |
ISBN | 9781562764579 |
This tutorial thoroughly teaches the security aspects of WinNT. It is divided into three sections, which address general security features, issues more relevant to administrators, and a pointed discussion on the merits of WinNT. The text covers release 4.0 of Windows NT Workstation and Server products.
Information Security Management Handbook on CD-ROM, 2006 Edition
Title | Information Security Management Handbook on CD-ROM, 2006 Edition PDF eBook |
Author | Micki Krause |
Publisher | CRC Press |
Pages | 4346 |
Release | 2006-04-06 |
Genre | Computers |
ISBN | 0849385857 |
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats at every turn. The Information Security Management Handbook on CD-ROM, 2006 Edition is now available. Containing the complete contents of the Information Security Management Handbook, this is a resource that is portable, linked and searchable by keyword. In addition to an electronic version of the most comprehensive resource for information security management, this CD-ROM contains an extra volume's worth of information that is not found anywhere else, including chapters from other security and networking books that have never appeared in the print editions. Exportable text and hard copies are available at the click of a mouse. The Handbook's numerous authors present the ten domains of the Information Security Common Body of Knowledge (CBK) ®. The CD-ROM serves as an everyday reference for information security practitioners and an important tool for any one preparing for the Certified Information System Security Professional (CISSP) ® examination. New content to this Edition: Sensitive/Critical Data Access Controls Role-Based Access Control Smartcards A Guide to Evaluating Tokens Identity Management-Benefits and Challenges An Examination of Firewall Architectures The Five "W's" and Designing a Secure Identity Based Self-Defending Network Maintaining Network Security-Availability via Intelligent Agents PBX Firewalls: Closing the Back Door Voice over WLAN Spam Wars: How to Deal with Junk E-Mail Auditing the Telephony System: Defenses against Communications Security Breaches and Toll Fraud The "Controls" Matrix Information Security Governance
Windows NT Security
Title | Windows NT Security PDF eBook |
Author | Michael McInerney |
Publisher | Prentice Hall |
Pages | 440 |
Release | 2000 |
Genre | Computers |
ISBN |
A guide to new security features in NT 5.0. Major focus will be on new encryption features and the use of Kerberos. In the Microsoft Technology Series.
MCSE Supporting and Maintaining a Windows NT Server 4.0 Network
Title | MCSE Supporting and Maintaining a Windows NT Server 4.0 Network PDF eBook |
Author | Dennis Maione |
Publisher | Que Publishing |
Pages | 762 |
Release | 2001 |
Genre | Computers |
ISBN | 9780735711570 |
The leading certification product covering one of the hottest MCSE 2000 electives. This book not only prepares the reader for the exam, it provides them with the real-world ability to support and maintain networks that use Microsoft Windows NT Server 4.0 as a primary operating system in a mixed network. The book maps to the actual exam objectives, providing readers with an excellent study tool that is thorough, accurate, and reader-friendly.
Information Security Management Handbook
Title | Information Security Management Handbook PDF eBook |
Author | Harold Tipton |
Publisher | CRC Press |
Pages | 1106 |
Release | 2019-08-08 |
Genre | Computers |
ISBN | 1351090445 |
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference. The changes in the technology of information security and the increasing threats to security make a complete and up-to-date understanding of this material essential. Volume 4 supplements the information in the earlier volumes of this handbook, updating it and keeping it current. Organized by the ten domains of the Common Body of Knowledge (CBK) on which the CISSP exam is based, this volume gives you the information you need to understand what makes information secure and how to secure it. Because the knowledge required to master information security - the CBK - is growing so quickly, there is little duplication of material among the four volumes. As a study guide or resource that you can use on the job, the Information Security Management Handbook, Fourth Edition, Volume 4 is the book you will refer to over and over again.