Protect Your Windows Network
Home > Computing and Information Technology > Computer networking and communications > Network security > Protect Your Windows Network: From Perimeter to Data
Protect Your Windows Network: From Perimeter to Data

Protect Your Windows Network: From Perimeter to Data

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

While there are a lot of books available on network security, most of them take the approach of focusing on the attacks, on the hacks, and responding to those on a one-by-one basis. This book does just the opposite, focusing on a holistic approach to protecting your entire network. It covers all seven layers of the Defense in Depth (DID) Model, as well as other material not covered in any other books. DID refers to a system of combining defenses to provide added protection. Since there are then multiple barriers between the attacker and the attacked, this increases the level of security, and increases the cost of the attack to the attacker. The authors are two senior members of Microsoft's Security and Business Technology Unit (SBTU), and are among the most sought-after speakers for security conferences. With security being such a strong focus at Microsoft, this book is destined to become the standard guide for all network administrators and architects who want to have the most secure Windows network possible.

Table of Contents:
Acknowledgments. About the Authors. Preface. I. INTRODUCTION AND FUNDAMENTALS. 1. Introduction to Network Protection.     Why Would Someone Attack Me?     Nobody Will Ever Call You to Tell You How Well the Network Is Working     Introduction to the Defense-in-Depth Model     The Defender's Dilemma     Summary     What You Should Do Today 2. Anatomy of a Hack-The Rise and Fall of Your Network.     What a Penetration Test Will Not Tell You     Why You Need To Understand Hacking     Target Network     Network Footprinting     Initial Compromise     Elevating Privileges     Hacking Other Machines     Taking Over the Domain     Post-mortem     How to Get an Attacker Out of Your Network     Summary     What You Should Do Today 3. Rule Number 1: Patch Your Systems.     Patches Are a Fact of Life     Exercise Good Judgment     What Is a Patch?     Patch Management Is Risk Management     Tools to Manage Security Updates     Advanced Tips and Tricks     Slipstreaming     Summary     What You Should Do Today II. POLICIES, PROCEDURES, AND USER AWARENESS. 4. Developing Security Policies.     Who Owns Developing Security Policy     What a Security Policy Looks Like     Why a Security Policy Is Necessary     Why So Many Security Policies Fail     Analyzing Your Security Needs to Develop _Appropriate Policies     How to Make Users Aware of Security Policies     Procedures to Enforce Policies     Dealing with Breaches of Policy     More Information     Summary     What You Should Do Today 5. Educating Those Pesky Users.     System Administration ? Security Administration     Securing People     The Problem     Protecting People     Plausibility + Dread + Novelty = Compromise     Things You Should Do Today III. PHYSICAL AND PERIMETER SECURITY: THE FIRST LINE OF DEFENSE. 6. If You Do Not Have Physical Security, You Do Not Have Security.     But First, a Story     It's a Fundamental Law of Computer Security     The Importance of Physical Access Controls     Protecting Client PCs     The Case of the Stolen Laptop     The Family PC     No Security, Physical or Otherwise, Is Completely Foolproof     Things You Should Do Today 7. Protecting Your Perimeter.     The Objectives of Information Security     The Role of the Network     Start with (What's Left of) Your Border     Next, Use the Right Firewall     Then, Consider Your Remote Access Needs     Finally, Start Thinking About "Deperimeterization"     Things You Should Do Today IV. PROTECTING YOUR NETWORK INSIDE THE PERIMETER. 8. Security Dependencies.     Introduction to Security Dependencies     Administrative Security Dependencies     Service Account Dependencies     Mitigating Service and Administrative Dependencies     Other Security Dependencies     Summary     What You Should Do Today 9. Network Threat Modeling.     Network Threat Modeling Process     Document Your Network     Segment Your Network     Restrict Access to Your Network     Summary     What You Should Do Today 10. Preventing Rogue Access Inside the Network.     The Myth of Network Sniffing     Network Protection at Layers 2 and 3     Using 802.1X for Network Protection     Using IPsec for Network Protection     Network Quarantine Systems     Summary     What You Should Do Today 11. Passwords and Other Authentication Mechanisms-The Last Line of Defense.     Introduction     Password Basics     Password History     What Administrators Need to Know About Passwords     Password Best Practices     Recommended Password Policy     Better Than Best Practices-Multifactor Authentication     Summary     What You Should Do Today V. PROTECTING HOSTS. 12. Server and Client Hardening.     Security Configuration Myths     On to the Tweaks     Top 10 (or so) Server Security Tweaks     Top 10 (or so) Client Security Tweaks     The Caution List-Changes You Should Not Make     Security Configuration Tools     Summary     What You Should Do Today VI. PROTECTING APPLICATIONS. 13. Protecting User Applications.     Patch Them!     Make Them Run As a Nonadmin     Turn Off Functionality     Restrict Browser Functionality     Attachment Manager     Spyware     Security Between Chair and Keyboard (SeBCAK)     Summary     What You Should Do Today 14. Protecting Services and Server Applications.     You Need a Healthy Disrespect for Your Computer     Rule 1: All Samples Are Evil     Three Steps to Lowering the Attack Surface     What About Service Accounts?     Privileges Your Services Do Not Need     Hardening SQL Server 2000     Hardening IIS 5.0 and 6.0     Summary     What You Should Do Today 15. Security for Small Businesses.     Protect Your Desktops and Laptops     Protect Your Servers     Protect Your Network     Keep Your Data Safe     Use the Internet Safely     Small Business Security Is No Different, Really     What You Should Do Today 16. Evaluating Application Security.     Caution: More Software May Be Hazardous to Your Network Health     Baseline the System     Things to Watch Out For     Summary     What You Should Do Today VII. PROTECTING DATA. 17. Data-Protection Mechanisms.     Security Group Review     Access Control Lists     Layers of Access Control     Access Control Best Practices     Rights Management Systems     Incorporating Data Protection into Your Applications     Protected Data: Our Real Goal     What You Should Do Today Appendix A: How to Get Your Network Hacked in 10 Easy Steps. Appendix B: Script To Revoke SQL Server PUBLIC Permissions. Appendix C. HOSTS file to Block Spyware. Appendix D. Password Generator Tool.     -g (Generate Password Based on Known Input)     -r (Generate Random Password)     -s (Set a Password on an Account and/or Service)     Security Information     Usage Scenarios Appendix E: 10 Immutable Laws of Security.     Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore.     Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore.     Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.     Law #4: -If you allow a bad guy to upload programs to your Web site, it's not your Web site any more.     Law #5: Weak passwords trump strong security.     Law #6: A computer is only as secure as the administrator is trustworthy.     Law #7: Encrypted data is only as secure as the decryption key.     Law #8: An out-of-date virus scanner is only marginally better than no virus scanner at all.     Law #9: Absolute anonymity isn't practical, in real life or on the Web.     Law #10: Technology is not a panacea. Index.  


Best Sellers


Product Details
  • ISBN-13: 9780321336439
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison-Wesley Educational Publishers Inc
  • Height: 241 mm
  • No of Pages: 608
  • Sub Title: From Perimeter to Data
  • Width: 179 mm
  • ISBN-10: 0321336437
  • Publisher Date: 14 Jun 2005
  • Binding: SA
  • Language: English
  • Spine Width: 31 mm
  • Weight: 888 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Protect Your Windows Network: From Perimeter to Data
Pearson Education (US) -
Protect Your Windows Network: From Perimeter to Data
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Protect Your Windows Network: From Perimeter to Data

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!