Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Person/Organisation
  • 1
    Online-Ressource
    Online-Ressource
    Amsterdam ; : Elsevier Digital Press,
    UID:
    almahu_9948026152402882
    Umfang: 1 online resource (781 p.)
    ISBN: 1-281-02261-6 , 9786611022617 , 0-08-052112-6
    Serie: HP Technologies S
    Inhalt: Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS.*Explains nuts and bolts of Windows Serv
    Anmerkung: Description based upon print version of record. , Front Cover; Windows Server 2003 Security Infrastructures; Copyright Page; Contents; Foreword by Tony Redmond; Foreword by Mark Mortimore; Preface; Acknowledgments; Chapter 1. The Challenge of Trusted Security Infrastructures; 1.1 Introduction; 1.2 Positioning trusted security infrastructures; 1.3 The fundamental role of trust; 1.4 TSI roles; 1.5 The long road toward unified TSI solutions; 1.6 Microsoft and the challenge of TSIs; 1.7 Conclusion; Chapter 2. Windows Security Authorities and Principals; 2.1 Security authorities; 2.2 Security principals; Chapter 3. Windows Trust Relationships , 3.1 Defining trust relationships3.2 Trust properties and types; 3.3 Trust relationships: Under the hood; 3.4 Forest trust; 3.5 Trusts and secure channels; 3.6 Trusts and firewalls; Chapter 4. Introducing Windows Authentication; 4.1 Authentication infrastructure terminology; 4.2 Qualifying authentication; 4.3 Authentication authentication architecture; 4.4 Authentication in the Windows machine startup and user logon sequences; 4.5 NTLM-based authentication; 4.6 Secondary logon service; 4.7 Anonymous access; 4.8 Credential caching; 4.9 General authentication troubleshooting , 4.10 What's coming up in the next chapters?Chapter 5. Kerberos; 5.1 Introducing Kerberos; 5.2 Kerberos: The basic protocol; 5.3 Logging on to windows using Kerberos; 5.4 Advanced Kerberos topics; 5.5 Kerberos configuration; 5.6 Kerberos and authentication troubleshooting; 5.7 Kerberos interoperability; Chapter 6. IIS Authentication; 6.1 Secure by default in IIS 6.0; 6.2 Introducing IIS authentication; 6.3 HTTP authentication; 6.4 Integrated Windows authentication; 6.5 Passport-based authentication; 6.6 Certificate-based authentication; 6.7 IIS Authentication method comparison , Chapter 7. Microsoft Passport7.1 Passport-enabling Web technologies; 7.2 Passport infrastructure; 7.3 Basic passport authentication exchange; 7.4 XP and Windows Server 2003 changes; 7.5 Passport cookies; 7.6 Passport authentication revisited; 7.7 Passport and the privacy of user information; 7.8 Passport integration in Windows Server 2003; 7.9 Passport futures; Chapter 8. UNIX and Windows Authentication Interoperability; 8.1 Comparing Windows and UNIX authentication; 8.2 Interoperability enabling technologies; 8.3 UNIX security-related concepts , 8.4 Windows and UNIX account management and authentication integration approaches8.5 Summary; Chapter 9. Single Sign-On; 9.1 Single sign-on: Pros and cons; 9.2 SSO architectures; 9.3 Extending SSO; 9.4 SSO technologies in Windows Server 2003 and XP; 9.5 Summary; Chapter 10. Windows Server 2003 Authorization; 10.1 Authorization basics; 10.2 The Windows authorization model; 10.3 Windows 2000 authorization changes; 10.4 Windows Server 2003 authorization changes; 10.5 Authorization intermediaries; 10.6 User rights; 10.7 Administrative delegation; 10.8 Authorization tools , Chapter 11. Malicious Mobile Code Protection , English
    Weitere Ausg.: ISBN 1-55558-283-4
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9786611022167?
Meinten Sie 9786611022600?
Meinten Sie 9786611019617?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz