Amazon cover image
Image from Amazon.com

Designing Microsoft windows 2000 network security / Microsoft Corporation.

By: Contributor(s): Series: Academic learning seriesPublication details: Washington : Microsoft press, c2001.Edition: Academic editionDescription: liv, 793 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.)ISBN:
  • 0735611343
  • 0735612692
Subject(s): DDC classification:
  • 005.8 22 DES
Online resources:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Open Access Book Open Access Engineering Library 005.8 DES 1 (Browse shelf(Opens below)) 1 Available BUML23112232
Book Open Access Book Open Access Engineering Library 005.8 DES 2 (Browse shelf(Opens below)) 2 Available BUML23112265

CONTENT

Chapter 1 Introduction to microsoft windows 2000 security

Lesson 1: Microsoft windows 2000 security services overview
Lesson 2: Determining security business requirements
Lesson 3: Designing security to meet technical requirements

Chapter 2 Designing active directory for security
Lesson 1 : Designing your forest structure
Lesson 2: Designing your domain structure
Lesson 3 Designing an OU Structure
Lesson 4 : Designing an audit strategy

Chapter 3 Designing authentication for a microsoft windows 2000 network
Lesson 1: Designing authentication in a microsoft windows 2000 network
Lesson 2; Designing Kerberos authentication
Lesson 3; NTLM Authentication
Lesson 4: Authenticating down level clients
Lesson 5: Planning server placement for authentication

Chapter 4 Planning a Microsoft windows 2000 administrative structure
Lesson 1; Planning administrative group membership
Lesson 2 Securing administrative access to the network

Chapter 5 Designing group security
Lesson 1: Designing Microsoft windows 2000 security groups
Lesson 2 Designing user rights

Chapter 6: Securing file resources
Lesson 1: Securing access to file resources
Lesson 2: Securing access to print resources
Lesson 3: planning EFS security

Chapter 7: Designing group policy
Lesson 1: Planning deployment of group policy
Lesson 2: Troubleshooting group policy

Chapter 8: Securing Microsoft windows 2000-based computers
Lesson 1: Planning Microsoft windows 2000 security templates
Lesson 2: Analyzing security settings to the security template
Lesson 3: Planning the deployment of security by using security templates

Chapter 9: Designing Microsoft windows 2000 services security
Lesson 1: Designing DNS security
Lesson 2: Designing DHCP security
Lesson 3: Designing RIS security
Lesson 4: Designing SNMP security
Lesson 5: Designing terminal services security

Chapter 10: Planning a public key infrastructure
Lesson 1: Planning a certification authority hierarchy
Lesson 2 : Managing certification authorities
Lesson 3: Using certificates for authentication

Chapter 11: Securing data at the application layer
Lesson 1: Planning authenticity and integrity of transmitted data
Lesson 2: Planning encryption of transmitted data

Chapter 12: Securing data with internet protocol security
Lesson 1: Designing IPSec corporation
Lesson 2: Planning IPSec deployment

Chapter 13: Securing access for remote users and networks
Lesson 1: Planning remote access security
Lesson 2: Designing remote access security for users
Lesson 3: Designing remote access security for networks
etc.

Chapter 14: Securing an extranet
Lesson 1: Identifying common firewall strategies
Lesson 2: Securing internet-accessible resources in a DMZ
Lesson 3: Securing data flow through a DMZ

Chapter 15: Securing internet access
Lesson 1: Designing an internet acceptable use policy
Lesson 2: Securing access to the internet by private network users
Lesson 3: Restricting access to content on the internet
etc.

Chapter 16: Securing access in a heterogeneous network environment
Lesson 1: Providing interoperability between windows 2000 and heterogeneous network
Lesson 2: Securing authentication in a heterogeneous network
Lesson 3: Designing directory synchronization and integration
etc.

Chapter 17: Designing a security plan
Lesson 1: Defining a security policy
Lesson 2: Developing a security plan
Lesson 3: Maintaining a security plan



Includes index.

There are no comments on this title.

to post a comment.