- Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products
- Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security
- As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years
- The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book
PART I: THE BASICS IN DEPTH. |
|
|
|
|
2. Conventional and Unconventional Defenses. |
|
|
|
|
PART II: OS HARDENING. |
|
|
4. Preventing Password Crackers. |
|
|
|
5. Protecting High-Risk Files. |
|
|
|
6. Protecting High-Risk Registry Entries. |
|
|
|
|
|
|
PART III: APPLICATION SECURITY. |
|
|
9. Stopping Unauthorized Execution. |
|
|
|
10. Securing Internet Explorer. |
|
|
|
|
|
|
|
13. Using Encrypting File System. |
|
|
PART IV: AUTOMATING SECURITY. |
|
|
14. Group Policy Explained Designing a Secure Active Directory. |
|
|
|
|
|
|
|
|
Roger A. Grimes (CPA, CISSP, MCSE: Security, MVP, CEH, CHFI, TICSA) is a 20-year computer security consultant, writer, and teacher. He has written over a 150 national magazine articles on computer security, and this is his fifth book on Microsoft Windows security. He has consulted for many of the worlds best-known enterprises (including McAfee, Microsoft, Verisign, and IBM), multiple universities, cities and school systems, plus every branch of the U.S. armed forces. He is currently a highly rated instructor teaching Windows and Linux security in Foundstones Ultimate Hacking classes. He has presented at many of the industrys largest conferences, including MCP TechMentor, Windows Connections, and SANS. He was a contributing editor for Windows IT Pro magazine, and is the security columnist for InfoWorld magazine. He has written several advanced security courses, including for Microsoft. He is a three-year recipient of Microsofts Most Valuable Professional (MVP) award, and was the creator and team leader of the successful www.hackiis6.com contest.