Security for Microsoft Windows System Administrators book cover

Security for Microsoft Windows System Administrators

Introduction to Key Information Security Concepts

Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is divided into six chapters that cover details about network attacks, system failures, audits, and social networking. The book introduces general security concepts including the principles of information security, standards, regulation, and compliance; authentication, authorization, and accounting; and access control. It also covers the cryptography and the principles of network, system, and organizational and operational security, including risk analysis and disaster recovery. The last part of the book presents assessments and audits of information security, which involve methods of testing, monitoring, logging, and auditing. This handy guide offers IT practitioners, systems and network administrators, and graduate and undergraduate students in information technology the details they need about security concepts and issues. Non-experts or beginners in Windows systems security will also find this book helpful.

Audience
Systems and Network Administrators

Paperback, 216 Pages

Published: September 2010

Imprint: Syngress

ISBN: 978-1-59749-594-3

Reviews

  • "This handy guide features security information for Windows novices and more experienced admins alike, including security basics and tools that provide advanced protection against network attacks and system failures."--TechTarget’s round-up of the "Five Windows Servers books to watch for in 2011"

    "Anyone faced with securing Windows systems for the first time would do well to make this book their first port of call. It’s a well-balanced overview of all the facets of Windows system management that need to be addressed from a security perspective. In fact, it’s a useful book for anyone, working on any platform, who needs to understand where security issues reside within corporate systems. That’s because, although it is focused on Windows, and all the practical examples, screenshots and step-by-step instructions relate to that platform, the author also devotes considerable portions of the book to the conceptual groundwork…. IT practitioners who need to get to grips with security issues will find the book a valuable briefing on the most pressing issues, along with a great deal of practical, hands-on advice on how you go about putting the principles into action in a Windows environment…. this book gives you a kind of ‘to do’ list of features and functions that need to be addressed."--Network Security


Contents


  • Acknowledgments

    About the Author

    Chapter 1 Introduction to General Security Concepts

        Principles of Information Security

        Information Security Standards, Regulations, and Compliance

        Authentication, Authorization, and Accounting (AAA)

        Access Control

        Summary

    Chapter 2 Cryptography

        Basic Cryptography Concepts

        PKI Concepts

        Implementing PKI and Certificate Management

        Summary

    Chapter 3 Network Security

        General Network Concepts and Vulnerabilities

        Network Services and Network Devices

        Internet Security and Vulnerabilities

        Network Security Tools and Devices

        Summary

    Chapter 4 System Security

        General System Security Threats

        Hardware and Peripheral Devices

        OS and Application Security

        Virtualization

        System-Based Security Applications

        Summary

    Chapter 5 Organizational and Operational Security

        Physical Security Concepts and Vulnerabilities

        Policies and Procedures

        Risk Analysis

        Business Continuity and Disaster Recovery

        Summary

    Chapter 6 Security Assessments and Audits

        Vulnerability Assessments and Testing

        Monitoring

        Logging and Auditing

        Summary

    Appendix A: Common Applications and Port Numbers

    Appendix B: Information Security Professional Certifications

    Index






Advertisement

advert image