Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is divided into six chapters that cover details about network attacks, system failures, audits, and social networking. The book introduces general security concepts including the principles of information security, standards, regulation, and compliance; authentication, authorization, and accounting; and access control. It also covers the cryptography and the principles of network, system, and organizational and operational security, including risk analysis and disaster recovery. The last part of the book presents assessments and audits of information security, which involve methods of testing, monitoring, logging, and auditing. This handy guide offers IT practitioners, systems and network administrators, and graduate and undergraduate students in information technology the details they need about security concepts and issues. Non-experts or beginners in Windows systems security will also find this book helpful.

Key Features

  • Take all the confusion out of security including: network attacks, system failures, social networking, and even audits
  • Learn how to apply and implement general security concepts
  • Identify and solve situations within your network and organization


Systems and Network Administrators

Table of Contents

Acknowledgments About the Author Chapter 1 Introduction to General Security Concepts     Principles of Information Security     Information Security Standards, Regulations, and Compliance     Authentication, Authorization, and Accounting (AAA)     Access Control     Summary Chapter 2 Cryptography     Basic Cryptography Concepts     PKI Concepts     Implementing PKI and Certificate Management     Summary Chapter 3 Network Security     General Network Concepts and Vulnerabilities     Network Services and Network Devices     Internet Security and Vulnerabilities     Network Security Tools and Devices     Summary Chapter 4 System Security     General System Security Threats     Hardware and Peripheral Devices     OS and Application Security     Virtualization     System-Based Security Applications     Summary Chapter 5 Organizational and Operational Security     Physical Security Concepts and Vulnerabilities     Policies and Procedures     Risk Analysis     Business Continuity and Disaster Recovery     Summary Chapter 6 Security Assessments and Audits     Vulnerability Assessments and Testing     Monitoring     Logging and Auditing     Summary Appendix A: Common Applications and Port Numbers Appendix B: Information Security Professional Certifications Index


No. of pages:
© 2011
Print ISBN:
Electronic ISBN:


"This handy guide features security information for Windows novices and more experienced admins alike, including security basics and tools that provide advanced protection against network attacks and system failures."--TechTarget’s round-up of the "Five Windows Servers books to watch for in 2011"

"Anyone faced with securing Windows systems for the first time would do well to make this book their first port of call. It’s a well-balanced overview of all the facets of Windows system management that need to be addressed from a security perspective. In fact, it’s a useful book for anyone, working on any platform, who needs to understand where security issues reside within corporate systems. That’s because, although it is focused on Windows, and all the practical examples, screenshots and step-by-step instructions relate to that platform, the author also devotes considerable portions of the book to the conceptual groundwork…. IT practitioners who need to get to grips with security issues will find the book a valuable briefing on the most pressing issues, along with a great deal of practical, hands-on advice on how you go about putting the principles into action in a Windows environment…. this book gives you a kind of ‘to do’ list of features and functions that need to be addressed."--Network Security