Books & Videos

Table of Contents

  1. Chapter 1 Introduction to Windows Server 2003 Security

    1. What Is Security?

    2. What Is Windows Server 2003?

    3. Security Design in Windows Server 2003

    4. Security Features in the Windows Server 2003 Family

    5. Summary

  2. Chapter 2 Basics of Computer Security

    1. Why Computer Security Is Important

    2. Security Enforcement Mechanisms

    3. POLA: The Principle of Least Access

    4. Key-Based Cryptography

    5. Authorization and Authentication

    6. Password Basics

    7. Network Security

    8. Keeping Your Eyes Open

    9. Summary

  3. Chapter 3 Physical Security

    1. Identifying Physical Security Vulnerabilities

    2. Protecting Physical Assets

    3. Holistic Security: Best Practices

    4. Summary

  4. Chapter 4 File System Security

    1. Protecting Files with NTFS File Permissions

    2. Protecting Data with the Encrypting File System

    3. Protecting System Information with Syskey

    4. Summary

  5. Chapter 5 Group Policy and Security Templates

    1. What Is Group Policy?

    2. How Group Policy Works

    3. How Do Security Templates Work?

    4. Using Group Policy to Enforce Security

    5. Using Security Templates to Deploy Secure Configurations

    6. Summary

  6. Chapter 6 Running Secure Code

    1. Identifying Secure Code

    2. Driver Signing

    3. Software Restriction Policies

    4. Summary

  7. Chapter 7 Authentication

    1. LAN Manager and NTLM

    2. Kerberos

    3. Summary

  8. Chapter 8 IP Security

    1. What Is IP Security?

    2. How Does IPSec Work?

    3. Microsoft’s Implementation of IPSec in Windows Server 2003

    4. Using IPSec Correctly

    5. Summary

  9. Chapter 9 Certificates and Public Key Infrastructure

    1. What Are Certificates?

    2. What Do I Do with Certificates?

    3. What Is a Certification Authority?

    4. Deciding Between Public and Private Certification Authorities

    5. Implementing a Public PKI

    6. Planning Your Private Certification Hierarchy

    7. Implementing a Private Certification Hierarchy

    8. Maintaining Your Hierarchy

    9. Summary

  10. Chapter 10 Smart Card Technology

    1. What Are Smart Cards?

    2. Using Smart Cards

    3. Summary

  11. Chapter 11 DHCP and DNS Security

    1. DHCP

    2. DNS

    3. DNS and DHCP Together

    4. Summary

  12. Chapter 12 Internet Information Services Security

    1. What Is IIS?

    2. How Does IIS Work?

    3. Using IIS Securely

    4. Summary

  13. Chapter 13 Active Directory Security

    1. What Is Active Directory?

    2. Structural Components of Active Directory

    3. Domain Controllers

    4. Default Security Through GPOs

    5. Providing Security for Domains

    6. Providing Security for Forests

    7. Providing Security for Active Directory Objects

    8. Providing Security for Domain Controllers

    9. Summary

  14. Chapter 14 Remote Access Security

    1. What Is Remote Access?

    2. Controlling Access

    3. Authentication and Encryption Protocols

    4. Virtual Private Networks

    5. Example Implementations for Remote Access

    6. Summary

  15. Chapter 15 Auditing and Ongoing Security

    1. Security Policies and Procedures

    2. Auditing

    3. Operating System Updates

    4. Summary

  1. Appendix Sending Secure Email

    1. What Is Secure Email?

    2. How Does Secure Email Work?

    3. Considerations for Secure Email

    4. Secure Email Implementation

    5. Summary

  2. Colophon