Atjaunināt sīkdatņu piekrišanu

E-grāmata: Microsoft Windows Security Essentials

3.83/5 (46 ratings by Goodreads)
  • Formāts: EPUB+DRM
  • Izdošanas datums: 03-Jun-2011
  • Izdevniecība: Sybex Inc.,U.S.
  • Valoda: eng
  • ISBN-13: 9781118114575
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 29,11 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 03-Jun-2011
  • Izdevniecība: Sybex Inc.,U.S.
  • Valoda: eng
  • ISBN-13: 9781118114575
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built.

This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content.





Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skills Offers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and more Reviews all the topics you need to know for taking the MTA 98-367 exam Provides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and servers

If you're new to IT and interested in entering the IT workforce, then Microsoft Windows Security Essentials is essential reading.
Introduction xix
Chapter 1 Understanding Core Security Principles
1(18)
Understanding Risk
1(3)
Exploring the Security Triad
4(3)
Protecting Against Loss of Confidentiality
5(1)
Protecting Against Loss of Availability
5(1)
Protecting Against Loss of Integrity
6(1)
Implementing a Defense-in-Depth Security Strategy
7(2)
Enforcing the Principle of Least Privilege
9(1)
Hardening a Server
10(6)
Reducing the Attack Surface
11(3)
Keeping a System Updated
14(2)
Enabling the Firewall
16(1)
Installing Antivirus Software
16(1)
The Essentials and Beyond
16(3)
Chapter 2 Understanding Malware and Social Engineering
19(24)
Comparing Malware
19(9)
Viruses
21(1)
Worms
22(1)
Trojan Horses
23(2)
Buffer-Overflow Attacks
25(1)
Spyware
26(1)
Understanding the Threat
27(1)
Protecting Against Malware
28(6)
Using Antivirus Software
29(2)
Using Microsoft Security Essentials on Desktops
31(3)
Thwarting Social-Engineering Attacks
34(5)
Social Engineering in Person
34(1)
Social Engineering with a Phone Call
34(1)
Recognizing Phishing Attempts
35(3)
Recognizing Pharming
38(1)
Protecting Email
39(2)
The Essentials and Beyond
41(2)
Chapter 3 Understanding User Authentication
43(26)
Comparing the Three Factors of Authentication
44(1)
Using Passwords for Authentication
45(14)
Comparing Password Attack Methods
45(2)
Creating Strong Passwords
47(2)
Enforcing Strong Passwords
49(2)
Exploring Account Lockout Policies
51(2)
Unlocking an Account
53(2)
Resetting a Password
55(2)
Changing a Password
57(1)
Creating a Password-Reset Disk
58(1)
Using Smart Cards and Token Devices for Authentication
59(1)
Using Biometrics for Authentication
60(1)
Starting Applications with Run As Administrator
61(2)
Preventing Time Skew with Kerberos
63(1)
Identifying RADIUS Capabilities
64(1)
Identifying Unsecure Authentication Protocols
65(2)
LM
66(1)
NTLM (NTLMν1)
66(1)
The Essentials and Beyond
67(2)
Chapter 4 Securing Access with Permissions
69(26)
Comparing NTFS Permissions
69(12)
Identifying Basic NTFS Permissions
70(1)
Identifying Advanced NTFS Permissions
71(4)
Combining Permissions
75(1)
Enabling and Disabling Permission Inheritance
76(3)
Moving and Copying Files
79(2)
Comparing NTFS and FAT
81(1)
Exploring Share Permissions
81(6)
Identifying Share Permissions
83(2)
Combining NTFS and Share Permissions
85(2)
Identifying Active Directory Permissions
87(4)
Viewing Active Directory Users and Computers
87(1)
Comparing NTFS and Active Directory Permissions
88(1)
Viewing Active Directory Permissions
88(3)
Assigning Registry Permissions
91(2)
The Essentials and Beyond
93(2)
Chapter 5 Using Audit Policies and Network Auditing
95(26)
Exploring Audit Policies
96(9)
Exploring Object Access Auditing
99(2)
Comparing Account Logon and Logon Events
101(1)
Exploring Directory Service Access Auditing
102(1)
Understanding Account Management Auditing
103(1)
Understanding System Events Auditing
103(1)
Understanding Privilege Use Auditing
104(1)
Understanding Policy Change Auditing
105(1)
Understanding Process Tracking
105(1)
Enabling Auditing
105(5)
Enabling Object Access Auditing
107(1)
Enabling Directory Service Access Auditing
108(2)
Viewing Audit Information
110(1)
Managing Security Logs
111(3)
Saving Audit Information
113(1)
Securing Audit Information
113(1)
Auditing a Network with MBSA
114(3)
Installing MBSA
116(1)
Running MBSA
116(1)
The Essentials and Beyond
117(4)
Chapter 6 Protecting Clients and Servers
121(26)
Understanding User Account Control
122(3)
Understanding the Dimmed Desktop
123(1)
Modifying User Account Control
123(2)
Keeping Systems Updated
125(5)
Updating Systems with Automatic Updates
126(2)
Updating Systems with WSUS or SCCM
128(1)
Using Group Policy to Configure Clients
129(1)
Protecting Clients
130(5)
Understanding Offline Folders
130(2)
Encrypting Offline Folders
132(1)
Using Software-Restriction Policies
133(2)
Protecting Servers
135(5)
Using Separate VLANs
136(1)
Separating Services
136(3)
Using Read-Only Domain Controllers
139(1)
Exploring DNS Security Issues
140(4)
Protecting Against Email Spoofing with SPF Records
141(1)
Understanding Dynamic Updates
141(1)
Using Secure Dynamic Updates
142(2)
The Essentials and Beyond
144(3)
Chapter 7 Protecting a Network
147(24)
Identifying Common Attack Methods
147(6)
Denial of Service
148(1)
Distributed Denial of Service
149(1)
Sniffing Attack
149(2)
Spoofing Attack
151(1)
Port Scan
151(2)
Exploring Firewalls
153(6)
Comparing Hardware-Based and Software-Based Firewalls
154(1)
Comparing UTMs and SCMs
155(2)
Isolating Servers on Perimeter Networks
157(2)
Using Honeypots
159(1)
Isolating a Network with NAT
159(1)
Exploring Network Access Protection
159(5)
Understanding NAP Components
160(2)
Evaluating Client Health with VPN Enforcement
162(1)
Using Other NAP Enforcement Methods
163(1)
Identifying NAP Requirements
163(1)
Identifying Protocol Security Methods
164(4)
IPsec
165(1)
Comparing Tunneling Protocols
166(1)
DNSSEC
167(1)
The Essentials and Beyond
168(3)
Chapter 8 Understanding Wireless Security
171(22)
Comparing Wireless Devices
171(3)
Wireless Adapters
172(1)
Wireless Access Points
173(1)
Wireless Routers
173(1)
Comparing Wireless Security Methods
174(9)
Understanding Encryption Keys
175(1)
Wired Equivalent Privacy
175(1)
Wi-Fi Protected Access
176(1)
Wi-Fi Protected Access Version 2
177(1)
Extended Authentication Protocol
178(1)
Viewing Windows 7 Wireless Settings
179(4)
Configuring Wireless Routers
183(6)
Changing the Default Administrator Password
183(1)
Changing the SSID
183(2)
To Broadcast or Not to Broadcast
185(2)
Using MAC Filters
187(2)
Configuring Windows 7 for Wireless
189(1)
The Essentials and Beyond
190(3)
Chapter 9 Understanding Physical Security
193(22)
Comparing Site Security and Computer Security
194(6)
Understanding the Importance of Physical Security
194(2)
Controlling Physical Access
196(3)
Using Switches Instead of Hubs
199(1)
Using Group Policy to Enhance Computer Security
200(11)
Understanding Default GPOs
200(1)
Designing OUs and GPOs to Manage Users and Computers
201(1)
Creating OUs in a Domain
202(1)
Moving Objects into an OU
203(1)
Creating GPOs to Manage Users and Computers
203(1)
Understanding Security Settings in a GPO
204(2)
Disabling Log On Locally with Group Policy
206(3)
Controlling Removable Storage Access with Group Policy
209(2)
Exploring Mobile Device Security
211(2)
Protecting Mobile Devices Against Malware
212(1)
Minimizing Risks with Bluetooth Devices
212(1)
The Essentials and Beyond
213(2)
Chapter 10 Enforcing Confidentiality with Encryption
215(26)
Comparing Encryption Methods
216(9)
Understanding Symmetric Encryption
216(2)
Exploring AES
218(1)
Understanding Asymmetric Encryption
219(3)
Using Certificates to Share Public Keys
222(1)
Understanding Hashing
223(2)
Securing Email
225(6)
Encrypting Email
226(2)
Digitally Signing Email
228(3)
Understanding EFS
231(4)
Encrypting and Decrypting Files with EFS
232(1)
Understanding the Recovery Agent
233(1)
Understanding Behavior When Files Are Moved or Copied
233(2)
Exploring BitLocker Drive Encryption
235(3)
Understanding BitLocker Requirements
235(1)
Understanding Recovery Keys
236(1)
Using BitLocker To Go
237(1)
The Essentials and Beyond
238(3)
Chapter 11 Understanding Certificates and a PKI
241(16)
Understanding a Certificate
241(10)
Comparing Public and Private Keys
243(2)
Understanding Certificate Errors
245(3)
Viewing Certificate Properties
248(3)
Exploring the Components of a PKI
251(4)
Understanding the Certificate Chain
252(2)
Comparing Certificate Services
254(1)
The Essentials and Beyond
255(2)
Chapter 12 Understanding Internet Explorer Security
257(20)
Exploring Browser Settings
257(12)
Understanding IE Enhanced Security Configuration
259(1)
Selecting Cookies Settings
260(2)
Manipulating the Pop-up Blocker
262(1)
Using InPrivate Filtering and InPrivate Browsing
263(2)
Deleting Browser History
265(1)
Managing Add-ons
266(2)
Exploring Advanced Security Settings
268(1)
Comparing Security Zones
269(3)
Using IE Tools to Identify Malicious Websites
272(1)
Understanding the SmartScreen Filter
272(1)
Modifying Protected Mode
273(1)
The Essentials and Beyond
273(4)
APPENDIX A Answers to Review Questions
277(10)
Chapter 1
277(1)
Chapter 2
278(1)
Chapter 3
278(1)
Chapter 4
279(1)
Chapter 5
280(1)
Chapter 6
281(1)
Chapter 7
282(1)
Chapter 8
282(1)
Chapter 9
283(1)
Chapter 10
284(1)
Chapter 11
285(1)
Chapter 12
286(1)
APPENDIX B Microsoft's Certification Program
287(6)
Certification Objectives Map
288(5)
Index 293
Darril Gibson, MCSE, MCITP, ITIL v3, Security+, CISSP, is the CEO of Security Consulting and Training, LLC. A Microsoft Certified Trainer since August, 1999, he regularly teaches, writes, and consults on a wide variety of security and technical topics. He has authored, coauthored, or contributed to 14 books on a wide range of topics that include Server 2008, Windows 7, SQL Server, CompTIA Security+, and security.