Servicios Bibliotecarios
Información del autor
Autor Komar, Brian |
Documentos disponibles escritos por este autor (1)
Refinar búsqueda Consulta a fuentes externas
Microsoft Windows Security Resource Kit / Komar, Brian
Título : Microsoft Windows Security Resource Kit Tipo de documento: texto impreso Autores: Komar, Brian Editorial: Washington : Microsoft Press Fecha de publicación: 2003 Número de páginas: 754 p Il.: il. Dimensiones: Rústica ISBN/ISSN/DL: 978-0-7356-1868-8 Nota general: Incluye índice Palabras clave: INGENIERIA DE SISTEMAS, PROTOCOLOS, SEGURIDAD EN REDES Nota de contenido: Part 1. Applying Key Principles of Security. // 1. Key Principles of Security. // 2. Understanding your enemy. // Part 2. Securing Active Directory. // 3. Securing User Accounts and Passwords. // 4. Securing Active Directory Objects and Attributes. // 5. Implementing Group Policy. // 6. Designing Active Directory Forests and Domain for security. // Part 3. Securing the Core Operating System. // 7. Securing Permissions. // 8. Securing Services. // 9. Implementing TCP/IP. // 10. Securing Microsoft Explorer 6 y Microsoft Office XP. // 11. Configuring Security Templates. // 12. Auditing Microsoft Windows Security Events. // 13. Securing Mobile Computers. // Part 4. Securing Common Services. // 14. Implementing Security for Domain Controllers. // 15. Implementing Security for DNS Servers. // 16. Implementing Security for Terminal Services. // 17. Implementing Security for DHCP Servers. // 18. Implementing Security for WINS Servers. // 19. Implementing Security for Routing and Remote Access. // 20. Implementing Security for Certificate Services. // 21. Implementing Security for Microsoft IIS 5.0. // Part 5. Managing Security Updates. // 22. Patch Management. // 23. Using Patch Management Tools. // 24. Using Security Assesment Tools. // Part 6. Planning and Performing Security Assessments and Incident Responses. 25. Assessing the Security of a Network. // 26. Planning for Incident Response. // 27. Responding to Security Incidents. // Part 7. Applying Key Principles of Privacy. // 28. Understanding the Importance of Privacy. // 29. Defining Privacy for the Corporate Web Site. // 30. Deploying Privacy In the Enterprise. Microsoft Windows Security Resource Kit [texto impreso] / Komar, Brian . - Washington : Microsoft Press, 2003 . - 754 p : il. ; Rústica.
ISBN : 978-0-7356-1868-8
Incluye índice
Palabras clave: INGENIERIA DE SISTEMAS, PROTOCOLOS, SEGURIDAD EN REDES Nota de contenido: Part 1. Applying Key Principles of Security. // 1. Key Principles of Security. // 2. Understanding your enemy. // Part 2. Securing Active Directory. // 3. Securing User Accounts and Passwords. // 4. Securing Active Directory Objects and Attributes. // 5. Implementing Group Policy. // 6. Designing Active Directory Forests and Domain for security. // Part 3. Securing the Core Operating System. // 7. Securing Permissions. // 8. Securing Services. // 9. Implementing TCP/IP. // 10. Securing Microsoft Explorer 6 y Microsoft Office XP. // 11. Configuring Security Templates. // 12. Auditing Microsoft Windows Security Events. // 13. Securing Mobile Computers. // Part 4. Securing Common Services. // 14. Implementing Security for Domain Controllers. // 15. Implementing Security for DNS Servers. // 16. Implementing Security for Terminal Services. // 17. Implementing Security for DHCP Servers. // 18. Implementing Security for WINS Servers. // 19. Implementing Security for Routing and Remote Access. // 20. Implementing Security for Certificate Services. // 21. Implementing Security for Microsoft IIS 5.0. // Part 5. Managing Security Updates. // 22. Patch Management. // 23. Using Patch Management Tools. // 24. Using Security Assesment Tools. // Part 6. Planning and Performing Security Assessments and Incident Responses. 25. Assessing the Security of a Network. // 26. Planning for Incident Response. // 27. Responding to Security Incidents. // Part 7. Applying Key Principles of Privacy. // 28. Understanding the Importance of Privacy. // 29. Defining Privacy for the Corporate Web Site. // 30. Deploying Privacy In the Enterprise. Reserva
Reservar este documento
Ejemplares (2)
Código de barras Signatura Tipo de medio Ubicación Sección Estado 00004111 004.65/S643 Libro Biblioteca Principal -Medellín Colección General Disponible CD000943 004.65 / S643 Libro Biblioteca Principal -Medellín General Excluido de préstamo