Lýsing:
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built.
This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content. Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skills Offers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and more Reviews all the topics you need to know for taking the MTA 98-367 exam Provides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and servers If you're new to IT and interested in entering the IT workforce, then Microsoft Windows Security Essentials is essential reading.
Annað
- Höfundur: Darril Gibson
- Útgáfa:1
- Útgáfudagur: 03-06-2011
- Hægt að prenta út 10 bls.
- Hægt að afrita 2 bls.
- Format:ePub
- ISBN 13: 9781118114575
- Print ISBN: 9781118016848
- ISBN 10: 1118114574
Efnisyfirlit
- Cover
- Title
- Credits
- Copyright
- Publisher's Note
- Dedication
- Acknowledgments
- About the Author
- Introduction
- Who Should Read This Book
- What Is Covered in This Book
- Chapter 1: Understanding Core Security Principles
- Understanding Risk
- Exploring the Security Triad
- Implementing a Defense-in-Depth Security Strategy
- Enforcing the Principle of Least Privilege
- Hardening a Server
- The Essentials and Beyond
- Chapter 2: Understanding Malware and Social Engineering
- Comparing Malware
- Protecting Against Malware
- Thwarting Social-Engineering Attacks
- Protecting Email
- The Essentials and Beyond
- Chapter 3: Understanding User Authentication
- Comparing the Three Factors of Authentication
- Using Passwords for Authentication
- Using Smart Cards and Token Devices for Authentication
- Using Biometrics for Authentication
- Starting Applications with Run As Administrator
- Preventing Time Skew with Kerberos
- Identifying RADIUS Capabilities
- Identifying Unsecure Authentication Protocols
- The Essentials and Beyond
- Chapter 4: Securing Access with Permissions
- Comparing NTFS Permissions
- Exploring Share Permissions
- Identifying Active Directory Permissions
- Assigning Registry Permissions
- The Essentials and Beyond
- Chapter 5: Using Audit Policies and Network Auditing
- Exploring Audit Policies
- Enabling Auditing
- Viewing Audit Information
- Managing Security Logs
- Auditing a Network with MBSA
- The Essentials and Beyond
- Chapter 6: Protecting Clients and Servers
- Understanding User Account Control
- Keeping Systems Updated
- Protecting Clients
- Protecting Servers
- Exploring DNS Security Issues
- The Essentials and Beyond
- Chapter 7: Protecting a Network
- Identifying Common Attack Methods
- Exploring Firewalls
- Exploring Network Access Protection
- Identifying Protocol Security Methods
- The Essentials and Beyond
- Chapter 8: Understanding Wireless Security
- Comparing Wireless Devices
- Comparing Wireless Security Methods
- Configuring Wireless Routers
- Configuring Windows 7 for Wireless
- The Essentials and Beyond
- Chapter 9: Understanding Physical Security
- Comparing Site Security and Computer Security
- Using Group Policy to Enhance Computer Security
- Exploring Mobile Device Security
- The Essentials and Beyond
- Chapter 10: Enforcing Confidentiality with Encryption
- Comparing Encryption Methods
- Securing Email
- Understanding EFS
- Exploring BitLocker Drive Encryption
- The Essentials and Beyond
- Chapter 11: Understanding Certificates and a PKI
- Understanding a Certificate
- Exploring the Components of a PKI
- The Essentials and Beyond
- Chapter 12: Understanding Internet Explorer Security
- Exploring Browser Settings
- Comparing Security Zones
- Using IE Tools to Identify Malicious Websites
- The Essentials and Beyond
- Appendix A: Answers to Review Questions
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11
- Chapter 12
- Appendix B: Microsoft’s Certification Program
- Certification Objectives Map
- Index
- Appendix C: Answers to Additional Exercises
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11
- Chapter 12
- Appendix D: Optional Lab to Create a Virtual Environment
- Identifying the Requirements
- Configuring Windows 7 with Virtualization
- Locating and Downloading an Evaluation Copy of Windows Server 2008
- Creating a Virtual Machine for Windows Server 2008
- Installing Windows Server 2008 on a Virtual Machine
- Configuring Windows Server 2008 on a Virtual Machine
- Promoting Windows Server 2008 to a Domain Controller
- Applying Changes to the Domain Controller
- Glossary
- End User License Agreement
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 12550
- Útgáfuár : 2011
- Leyfi : 379