Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 482 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
482
Dung lượng
9,06 MB
Nội dung
[...]... lexicon of the Windows system administrator), xxi xxii Hacking Exposed Windows: WindowsSecuritySecrets& Solutions improving visibility and control (the WindowsSecurity Center is now firmly ensconced in the System Tray/Notification Area of every modern Windows installation), adding new security functionality (Windows Defender anti-spyware), and making steady refinements (witness the Windows Firewall’s... for success Security in practice requires risk assessment, and successful risk assessment requires a deep understanding of both the threats and the defensive technologies xvii xviii Hacking Exposed Windows: WindowsSecuritySecrets& Solutions It’s this ability to help you perform accurate risk assessment that makes Hacking Exposed Windows valuable There are few places where you can get a one-stop look... 1 2 Hacking Exposed Windows: WindowsSecuritySecrets& Solutions I t’s difficult to talk about any system in a vacuum, especially a system that is so widely deployed in so many roles as Windows in all of its flavors This chapter previews some basic information system security defensive postures so that your understanding of the specifics of Windows is better informed A FRAMEWORK FOR OPERATIONAL SECURITY. .. Exposed For all of its similarities, Hacking Exposed Windows is also distinct from the original title in several key ways Obviously, it is focused on one platform, as opposed to the multidisciplinary approach of Hacking Exposed While Hacking Exposed surveys the Windowssecurity landscape, this book peels back further layers to explore the byte-level workings of Windowssecurity attacks and countermeasures,... organizational security policy starts with a good template We recommend the ISO 17799 policy framework, which has become quite popular as a framework for security policy since becoming an international standard ISO 17799 is being incorporated into the new ISO 27000–series standards, which encompass a range 5 6 Hacking Exposed Windows: WindowsSecuritySecrets& Solutions of information security management... Administrative Boundaries: Forest or Domain? The WindowsSecurity Architecture from the Hacker’s Perspective 16 17 18 19 19 20 22 25 28 30 31 32 36 39 41 42 43 43 xi xii Hacking Exposed Windows: Windows Security Secrets & Solutions Auditing Cryptography ... on Windows Authentication Subverting Windows Authentication Exploiting Windows- Specific Services Summary References and Further Reading Hacking Windows- Specif ic Services 117 117 118 119 121 137 148 156 161 162 165 Security. .. schedules of our target audience xxiii xxiv Hacking Exposed Windows: Windows Security Secrets & Solutions Moreover, we have strictly adhered to the clear, readable, and concise writing style that readers overwhelmingly responded to in Hacking Exposed We know you’re busy, and you need the straight dirt without a lot of doubletalk and needless jargon As a reader of Hacking Exposed once commented, “Reads like... http://support.microsoft.com/?kbid=123456, where 123456 represents the six-digit KB article ID xxv xxvi Hacking Exposed Windows: Windows Security Secrets & Solutions Other Visual Aids We’ve also made prolific use of visually enhanced icons to highlight those nagging little details that often get overlooked ONLINE RESOURCES AND TOOLS Windows security is a rapidly changing discipline, and we recognize that the printed word... Server 274 277 277 278 278 279 279 xiii xiv Hacking Exposed Windows: WindowsSecuritySecrets& Solutions Logging SQL Server 2005 Changes Hacking SQL Server SQL Server Information Gathering SQL Server Hacking Tools and Techniques