Windows Server 2003 Security Infrastructures: Core Security Features

Overview

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is ...
See more details below
Paperback
$87.05
BN.com price
(Save 11%)$97.95 List Price
Other sellers (Paperback)
  • All (8) from $2.03   
  • New (6) from $46.77   
  • Used (2) from $2.03   
Sending request ...

Overview

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS.

*Explains nuts and bolts of Windows Server 2003 security
*Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures
*Draws on the experience of a lead consultant in the Microsoft security area

Audience: IT Specialists and Solution Architects involved in the planning and design of a Windows.NET infrastructure; Windows NT consultants; Security Consultants; IT Managers.

Read More Show Less

Editorial Reviews

From the Publisher
"In many companies Windows servers no longer just have to be integrated in an existing security infrastructure ; they make the security infrastructure. This shift means people need better understanding of security terminology, security requirements and product integration with the non-Microsoft world. Jan, with his deep and broad knowledge of both worlds (Windows and security), again provides excellent information on these topics." --Roland Schoenauen, CISSP, Banque Générale du Luxembourg

"Jan De Clercq's book is of critical importance for everyone who needs to design and implement security strategies in Windows Server 2003. It contains lots of details and gives answers to the 'why' and 'how' of the OS security. Based on real-world experience, this comprehensive book is full of the practical information so important for administrators in their every day jobs." --Vladimir Kaplan, Morgan Stanley Information Technology

"Windows Server 2003 was designed with security in mind. This book is a great addition to the prescriptive security guidance for Windows Server 2003 prepared by Microsoft. It is a must for every architect that is looking after implementing Windows Server 2003-rooted security infrastructures in its enterprise I.T. environment. " -- Andreas Luther, Program Manager Directory Services, Microsoft

Read More Show Less

Product Details

  • ISBN-13: 9781555582838
  • Publisher: Elsevier Science
  • Publication date: 3/19/2004
  • Series: HP Technologies Series
  • Pages: 756
  • Product dimensions: 1.53 (w) x 7.50 (h) x 9.25 (d)

Meet the Author

Jan De Clercq is one of HP’s lead consultants in the space of Microsoft security. As a Senior Consultant, he is involved in many Windows implementations around the world and is a frequent speaker on the subject at Microsoft and general security conferences. In his HP Security Office member role he focuses on identity management. Jan is based in Belgium. He is co-author of Mission-Critical Active Directory (Digital Press, 2001).
Read More Show Less

Table of Contents

Foreword
Foreword
Preface
Acknowledgments
1 The Challenge of Trusted Security Infrastructures 1
2 Windows Security Authorities and Principals 29
3 Windows Trust Relationships 69
4 Introducing Windows Authentication 101
5 Kerberos 133
6 IIS Authentication 207
7 Microsoft Passport 241
8 UNIX and Windows Authentication Interoperability 261
9 Single Sign-On 299
10 Windows Server 2003 Authorization 329
11 Malicious Mobile Code Protection 393
12 New Authorization Tracks: Role-Based Access Control and Digital Rights Management 417
13 Introducing Windows Server 2003 Public Key Infrastructure 441
14 Trust in Windows Server 2003 PKI 493
15 The Certificate Life Cycle 545
16 Building and Maintaining a Windows PKI 603
17 Windows Server 2003 PKI-enabled Applications 643
18 Windows Server 2003 Security Management 687
App. A The ITU-T X.509 Standard for Certificate and CRL Formats 721
App. B PKCS Standards 725
Index 727
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)