Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is divided into six chapters that cover details about network attacks, system failures, audits, and social networking. The book introduces general security concepts including the principles of information security, standards, regulation, and compliance; authentication, authorization, and accounting; and access control. It also covers the cryptography and the principles of network, system, and organizational and operational security, including risk analysis and disaster recovery. The last part of the book presents assessments and audits of information security, which involve methods of testing, monitoring, logging, and auditing. This handy guide offers IT practitioners, systems and network administrators, and graduateand undergraduate students in information technology the details they need about security concepts and issues. Non-experts or beginners in Windows systems security will also find this book helpful.
Take all the confusion out of security including: network attacks, system failures, social networking, and even audits Learn how to apply and implement general security concepts Identify and solve situations within your network and organization
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Take all the confusion out of security including: network attacks, system failures, social networking, and even audits Learn how to apply and implement general security concepts Identify and solve situations within your network and organization
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
"This handy guide features security information for Windows novices and more experienced admins alike, including security basics and tools that provide advanced protection against network attacks and system failures."--TechTarget's round-up of the "Five Windows Servers books to watch for in 2011"
"Anyone faced with securing Windows systems for the first time would do well to make this book their first port of call. It's a well-balanced overview of all the facets of Windows system management that need to be addressed from a security perspective. In fact, it's a useful book for anyone, working on any platform, who needs to understand where security issues reside within corporate systems. That's because, although it is focused on Windows, and all the practical examples, screenshots and step-by-step instructions relate to that platform, the author also devotes considerable portions of the book to the conceptual groundwork.. IT practitioners who need to get to grips with security issues will find the book a valuable briefing on the most pressing issues, along with a great deal of practical, hands-on advice on how you go about putting the principles into action in a Windows environment.. this book gives you a kind of 'to do' list of features and functions that need to be addressed."--Network Security
"Anyone faced with securing Windows systems for the first time would do well to make this book their first port of call. It's a well-balanced overview of all the facets of Windows system management that need to be addressed from a security perspective. In fact, it's a useful book for anyone, working on any platform, who needs to understand where security issues reside within corporate systems. That's because, although it is focused on Windows, and all the practical examples, screenshots and step-by-step instructions relate to that platform, the author also devotes considerable portions of the book to the conceptual groundwork.. IT practitioners who need to get to grips with security issues will find the book a valuable briefing on the most pressing issues, along with a great deal of practical, hands-on advice on how you go about putting the principles into action in a Windows environment.. this book gives you a kind of 'to do' list of features and functions that need to be addressed."--Network Security