Windows 2000 Server Security for Dummies
Whether you are a networking neophyte or the administrator of a networking team, get the scoop on the new security tools with Windows 2000 Server Security For Dummies. From evaluating your organization's need to safeguard your network to facing very real security infringements, this book presents what you need to know in easy-to-follow steps...
* Investigate how hackers break into your network and understand why you should be concerned about security.
* Secure your files, folders, printers with an encrypting system and security settings.
* Figure out who should have access to which parts of your network.
* Uncover the steps to locking down the remote connection and certifying authentication.
* Secure all Internet Protocol traffic in and out of the devices on your network.
* Check your defenses, monitor for breaches, and audit activity on your network.
The enclosed CD-ROM offers you evaluation versions of SmartFilter for Microsoft Proxy Server, Interceptor, and ISS Internet Scanner. It also includes trial versons of Synchronicity 2.0 and SpamKiller.
Table of Contents
PART I: Windows 2000 Server Security Basic Training.
Chapter 1: Overcoming Your Insecurity about Security.
Chapter 2: 6,000 or So Words on Windows 2000 Networking.
Chapter 3: Securing the Basics.
PART II: Starting with a Good Defense.
Chapter 4: Avoiding Promiscuous Permissions.
Chapter 5: Using the Encrypting File System.
Chapter 6: Laying Down the Law with Security Settings.
Chapter 7: Reinforcing Security with Group Policy.
PART III: A Few More Ounces of Protection.
Chapter 8: Keeping the Registry Locked Down and Secure.
Chapter 9: Locking Down the Remote Connection.
Chapter 10: Certifying Authentication with Digital Certificates.
PART IV: Just When You Think You're Safe.
Chapter 11: Performing Your Security Due Diligence.
Chapter 12: Serving the Internet Securely.
Chapter 13: Ensuring that Your Users Aren't Browsing into Trouble.
Chapter 14: Keeping an Eye on IP Security.
PART V: The Part of Tens.
Chapter 15: Ten Intelligent Steps for Setting Up Smart Cards.
Chapter 16: Ten (Or so) Pieces of Advice for the Secure Road Warrior.
Chapter 17: Ten Questions You Might Ask about Firewalls.
Chapter 18: Ten Things to Add to Your Corporate Security Policy.
Appendix: About the CD.
IDG Books Worldwide End-User License Agreement.
Book Registration Information.
Sign up now »
- FTR&D EngineerSA
- FTOS Web Applications DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTLead Software EngineerSA
- FTQuality ManagerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTSenior Python DeveloperNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTechnical Business AnalystNSW
Cloud computing promises to help midmarket companies reduce cost and complexity in the IT equation – and gain the flexibility and agility they need to thrive. Yet charting a clear ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- IN PICTURES: Citrix Solutions expo (49 photos)
- IN PICTURES: Citrix parties one more night with Maroon 5 ( +57 photos)
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia