1. Trang chủ
  2. » Công Nghệ Thông Tin

hacking exposed-windows - windows security secrets & solutions, 3rd ed.

482 283 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 482
Dung lượng 9,06 MB

Nội dung

[...]... lexicon of the Windows system administrator), xxi xxii Hacking Exposed Windows: Windows Security Secrets & Solutions improving visibility and control (the Windows Security Center is now firmly ensconced in the System Tray/Notification Area of every modern Windows installation), adding new security functionality (Windows Defender anti-spyware), and making steady refinements (witness the Windows Firewall’s... for success Security in practice requires risk assessment, and successful risk assessment requires a deep understanding of both the threats and the defensive technologies xvii xviii Hacking Exposed Windows: Windows Security Secrets & Solutions It’s this ability to help you perform accurate risk assessment that makes Hacking Exposed Windows valuable There are few places where you can get a one-stop look... 1 2 Hacking Exposed Windows: Windows Security Secrets & Solutions I t’s difficult to talk about any system in a vacuum, especially a system that is so widely deployed in so many roles as Windows in all of its flavors This chapter previews some basic information system security defensive postures so that your understanding of the specifics of Windows is better informed A FRAMEWORK FOR OPERATIONAL SECURITY. .. Exposed For all of its similarities, Hacking Exposed Windows is also distinct from the original title in several key ways Obviously, it is focused on one platform, as opposed to the multidisciplinary approach of Hacking Exposed While Hacking Exposed surveys the Windows security landscape, this book peels back further layers to explore the byte-level workings of Windows security attacks and countermeasures,... organizational security policy starts with a good template We recommend the ISO 17799 policy framework, which has become quite popular as a framework for security policy since becoming an international standard ISO 17799 is being incorporated into the new ISO 27000–series standards, which encompass a range 5 6 Hacking Exposed Windows: Windows Security Secrets & Solutions of information security management... Administrative Boundaries: Forest or Domain? The Windows Security Architecture from the Hacker’s Perspective 16 17 18 19 19 20 22 25 28 30 31 32 36 39 41 42 43 43 xi xii Hacking Exposed Windows: Windows Security Secrets & Solutions Auditing Cryptography ... on Windows Authentication Subverting Windows Authentication Exploiting Windows- Specific Services Summary References and Further Reading Hacking Windows- Specif ic Services 117 117 118 119 121 137 148 156 161 162 165 Security. .. schedules of our target audience xxiii xxiv Hacking Exposed Windows: Windows Security Secrets & Solutions Moreover, we have strictly adhered to the clear, readable, and concise writing style that readers overwhelmingly responded to in Hacking Exposed We know you’re busy, and you need the straight dirt without a lot of doubletalk and needless jargon As a reader of Hacking Exposed once commented, “Reads like... http://support.microsoft.com/?kbid=123456, where 123456 represents the six-digit KB article ID xxv xxvi Hacking Exposed Windows: Windows Security Secrets & Solutions Other Visual Aids We’ve also made prolific use of visually enhanced icons to highlight those nagging little details that often get overlooked ONLINE RESOURCES AND TOOLS Windows security is a rapidly changing discipline, and we recognize that the printed word... Server 274 277 277 278 278 279 279 xiii xiv Hacking Exposed Windows: Windows Security Secrets & Solutions Logging SQL Server 2005 Changes Hacking SQL Server SQL Server Information Gathering SQL Server Hacking Tools and Techniques

Ngày đăng: 25/03/2014, 11:22

TỪ KHÓA LIÊN QUAN