Professional Windows Desktop and Server Hardening
  • Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products
  • Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security
  • As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years
  • The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book
1102553979
Professional Windows Desktop and Server Hardening
  • Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products
  • Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security
  • As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years
  • The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book
50.0 In Stock
Professional Windows Desktop and Server Hardening

Professional Windows Desktop and Server Hardening

by Roger A. Grimes
Professional Windows Desktop and Server Hardening

Professional Windows Desktop and Server Hardening

by Roger A. Grimes

Paperback

$50.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

  • Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products
  • Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security
  • As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years
  • The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book

Product Details

ISBN-13: 9780764599903
Publisher: Wiley
Publication date: 05/01/2006
Series: Programmer to Programmer Series
Pages: 608
Product dimensions: 7.42(w) x 9.21(h) x 1.40(d)

About the Author

Roger A. Grimes (CPA, CISSP, MCSE: Security, MVP, CEH, CHFI, TICSA) is a 20-year computer security consultant, writer, and teacher. He has written over a 150 national magazine articles on computer security, and this is his fifth book on Microsoft Windows security. He has consulted for many of the world’s best-known enterprises (including McAfee, Microsoft, Verisign, and IBM), multiple universities, cities and school systems, plus every branch of the U.S. armed forces. He is currently a highly rated instructor teaching Windows and Linux security in Foundstone’s Ultimate Hacking classes. He has presented at many of the industry’s largest conferences, including MCP TechMentor, Windows Connections, and SANS. He was a contributing editor for Windows IT Pro magazine, and is the security columnist for InfoWorld magazine. He has written several advanced security courses, including for Microsoft. He is a three-year recipient of Microsoft’s Most Valuable Professional (MVP) award, and was the creator and team leader of the successful www.hackiis6.com contest.

Read an Excerpt

Click to read or download

Table of Contents

Acknowledgments.

Introduction.

Part I: The Basics in Depth.

Chapter 1: Windows Attacks.

Chapter 2: Conventional and Unconventional Defenses.

Chapter 3: NTFS Permissions 101.

Part II: OS Hardening.

Chapter 4: Preventing Password Crackers.

Chapter 5: Protecting High-Risk Files.

Chapter 6: Protecting High-Risk Registry Entries.

Chapter 7: Tightening Services.

Chapter 8: Using IPSec.

Part III: Application Security.

Chapter 9: Stopping Unauthorized Execution.

Chapter 10: Securing Internet Explorer.

Chapter 11: Protecting E-mail.

Chapter 12: IIS Security.

Chapter 13: Using Encrypting File System.

Part IV: Automating Security.

Chapter 14: Group Policy Explained.

Chapter 15: Designing a Secure Active Directory Infrastructure.

Book Summary.

Index.

From the B&N Reads Blog

Customer Reviews