A managerial and practical technical tutorial for Windows NT/2000, this book provides an overview of how to develop a strategy to implement security within an organization. It presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The book includes the steps required to define a corporate security policy, how to implement that policy, and how to structure a project plan. Tables, charts, and work templates provide a starting point to begin assessing and implementing a solution that fits the unique needs of an organization. The book concludes by illustrating how to use Check Point FireWall-1/VPN-1 to secure a Windows NT/2000 server.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.