Cart
Free Shipping in the UK
Proud to be B-Corp

Windows NT Security Guide Stephen A. Sutton

Windows NT Security Guide By Stephen A. Sutton

Windows NT Security Guide by Stephen A. Sutton


£20.80
Condition - Very Good
Only 1 left

Summary

A guide that introduces administrators to the security features found in Windows NT and shows how to integrate them into their networked environment. This text addresses real-world questions and common threats such as, data snooping, password misuse and viruses.

Windows NT Security Guide Summary

Windows NT Security Guide by Stephen A. Sutton

"I will recommend Steve's new book to our customers. Steve's knowledge of operating systems security and government security requirements give him a deep understanding of how to utilize Windows NT in a secure manner." Curt Kolcun Systems Engineering Manager Microsoft "I found Windows NT Security Guide to be a true gem...it's not just a good book on security, it is instructional by design." Christopher Brown San Diego Windows NT User Group A Survival Guide for Safeguarding Your Windows NT System and Its Networks! Your computers are at risk, whether they are connected to a corporate intranet or the Internet, have access to a sensitive database, or simply sit on your desk when you're not there. In the Windows NT Security Guide, Steve Sutton, a security expert and corporate trainer, shows you how to maximize Windows NT's various security protections and avoid many of its pitfalls. This book explains NT's security features from a step-by-step, how-to perspective with numerous realistic examples. Whether you are a day-to-day user or network administrator, you'll find Windows NT Security Guide an invaluable reference.Windows NT Security Guide helps you: *Spot and protect against common threats, such as data snooping and tampering, password misuse, and viruses *Configure Windows NT against Internet and intranet security risks *Build your Security Policy for user accounts and groups, domains, Access Control Lists, and the security log *Understand the basics of cryptography that play large roles in today's global Internet environment *Use some of NT's lesser-known secure installation practices and cope with its inherent security soft spots *Answer the basic question: Is Windows NT secure enough for me? This book is accompanied by a complete set of on-line exercises and many "pencil" questions (and answers) so that you can also use it as a self-paced training tool. 0201419696B04062001

About Stephen A. Sutton

Steve Sutton is the founder of Trusted Systems Services, Inc., a computer-security consulting- and training company formed in 1986. He has been a prominent designer and teacher of secure operating systems and standards for almost two decades.

0201419696AB04062001

Table of Contents

I. GENERAL USE.

1. Introduction.

In This Chapter We Describe.

Windows NT and Security.

Trust, Threats, and the TCB.

About This Book.

Prerequisites.

Icons, Conventions, and Typography.

2. Accounts and Domains.

In This Chapter We Describe.

Domains and Workstations.

Accounts and the Logon Session.

Summary.

3. Your Working Environment.

In This Chapter We Describe.

The Trusted Path.

Choosing Passwords.

Other Topics.

Summary.

4. ACLs.

In This Chapter We Describe.

Introduction.

Groups.

Basic ACLs for Files.

The Access Decision.

Basic ACLs for Directories.

ACL Propagation: Protecting Trees.

Assorted ACL Topics.

Summary.

5. Special Situations.

Local Accounts and Matching.

In This Section We Describe.

Using the Remote Access Service.

Windows 95.

Windows for Workgroups.

II. ADMINISTRATION.

6. Planning Domains.

In This Chapter We Describe.

What Is Security "Administration"?.

Planning Domains.

Summary.

7. Managing Groups and Accounts.

In This Chapter We Describe.

User Groups.

Accounts.

The Rights Policy.

Administrative Access.

8. Security Auditing.

In This Chapter We Describe.

The Mechanics of Auditing.

Common Auditing Scenarios.

Working with the Security Log.

Deciding What to Audit.

Summary.

9. The Internet and Intranets.

In This Chapter We Describe.

Windows NT and Intranets.

Cryptography.

Internet Information Server.

Other Networking Topics.

10. Subsystems and Other Security Features.

In This Chapter We Describe.

NT Registry.

System Policy Editor.

Printers.

Administering Windows 95.

Administering WFW.

Other Topics.

11. The TCB.

In This Chapter We Describe.

What Constitutes the TCB?

Protecting the TCB.

Summary.

12. Summary and Checklist.

General User Education.

Domain Model and Network Administration.

Groups.

General Access to Workstations.

Accounts.

Security Auditing.

The TCB.

General.

Networking.

13. NT Security Discussion.

The TCSEC.

Windows NT and the TCSEC.

Networking.

NT Security Feature by Feature.

Third-Party Watch.

Appendix A: Secure Installation.

The Registry.

File System ACLs.

Rights Policy.

Troubleshooting.

Miscellaneous.

Appendix B: Glossary.
Appendix C: Answers.
Index.

Additional information

GOR005637327
9780201419696
0201419696
Windows NT Security Guide by Stephen A. Sutton
Used - Very Good
Paperback
Pearson Education (US)
1996-12-23
384
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Windows NT Security Guide