+612 9045 4394
 
CHECKOUT
$7.95 Delivery per order to Australia and New Zealand
100% Australian owned
Over a hundred thousand in-stock titles ready to ship
Maximum Windows 2000 Security : Maximum Security - Mark Burnett

Maximum Windows 2000 Security

Maximum Security

Paperback Published: 25th December 2001
ISBN: 9780672319655
Number Of Pages: 624

Share This Book:

Paperback

RRP $110.00
$85.25
22%
OFF
or 4 easy payments of $21.31 with Learn more
Ships in 10 to 15 business days

Earn 171 Qantas Points
on this Book

Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional Protocols,
  • Web Server Security,
  • Denial of Service Attacks,
  • Intrusion Detection,
  • Hacking Secure Code in Windows 2000.
  • Introductionp. 1
    Introduction to Windows 2000 Server Securityp. 5
    Hacking Windows 2000 Serversp. 7
    What Makes Windows 2000 Vulnerablep. 9
    Knowing the Toolsp. 13
    Summaryp. 14
    Windows 2000 Server Security Featuresp. 15
    Windows 2000 Security Featuresp. 16
    Enhanced Access Controlp. 16
    Enhanced Network Controlp. 20
    IPSec and VPNsp. 21
    Kerberosp. 22
    Advanced Authentication Supportp. 22
    File System Encryptionp. 26
    Loggingp. 27
    Summaryp. 28
    The Hacker Toolkitp. 29
    Types of Toolsp. 30
    The Hacker's Toolkitp. 32
    Tools for Your Toolsp. 36
    Building Toolsp. 39
    The Basic Toolsp. 41
    Summaryp. 43
    Windows 2000 Server Security Basicsp. 45
    Hacking Windows 2000: Getting Startedp. 47
    Finding Networksp. 49
    Finding Windows 2000 Serversp. 55
    Finding Open Servicesp. 57
    Evading Detectionp. 60
    Summaryp. 64
    Installing Windows 2000: The First Step Toward Securityp. 65
    Pre-Installation Considerationsp. 66
    The Installation Processp. 73
    Summaryp. 83
    Password Securityp. 85
    Inside Windows 2000 Passwordsp. 86
    What Are Hashes?p. 87
    Cracking Windows 2000 Passwordsp. 88
    Finding Password Hashesp. 92
    Cracking Password Hashesp. 94
    Protecting Passwords Through Security Policyp. 94
    Protecting Passwords Through User Educationp. 96
    Password Synchronization with Existing Unix Systemsp. 98
    Miscellaneous Password Issuesp. 99
    Maximum Password Securityp. 102
    Summary on Password Securityp. 103
    Windows 2000 Servicesp. 105
    Understanding How Services Workp. 106
    Windows 2000 Servicesp. 108
    Summaryp. 128
    Windows 2000 Networkingp. 129
    Windows 2000 Network Security Architecturep. 131
    Active Directoryp. 132
    Internet Protocol Security (IPSec)p. 137
    Public Key Infrastructure (PKI)p. 139
    Understanding Workgroupsp. 150
    Understanding Windows 2000 Domainsp. 150
    Interoperability and Heterogeneous Network Featuresp. 155
    Further Reading on Windows 2000 Network Security and on Windows 2000 Interoperabilityp. 156
    Summaryp. 157
    Network Protocols, Clients, and Servicesp. 159
    Open Systems Interconnection (OSI) Reference Modelp. 160
    TCP/IPp. 164
    Windows 2000 Clients, Protocols, and Servicesp. 171
    Name Resolution Servicesp. 178
    Summaryp. 179
    Trojans and Backdoorsp. 181
    Understanding Malicious Code Attacksp. 182
    Recent Malicious Code Attacksp. 186
    Protecting Windows 2000 Networks Against Malicious Code Attacksp. 188
    Additional Resources for Preventing Malicious Code Attacksp. 196
    Summaryp. 198
    Active Directoryp. 199
    Active Directory Namespacep. 200
    Active Directory Objectsp. 200
    Distributed Securityp. 212
    File and Folder Permissionsp. 214
    Summaryp. 219
    Security Policy and Configurationp. 221
    Security Configuration Tool Setp. 222
    What Is the Microsoft Management Console (MMC)?p. 222
    Security Areasp. 223
    Security Configuration Tool Set Componentsp. 227
    Security Templatesp. 228
    Security Configruation and Analysis Toolp. 238
    Security Settings Extension for the Group Policy Snap-Inp. 246
    secedit.exe Command-Lind Toolp. 247
    Summaryp. 251
    Exploiting Web Servicesp. 253
    Background of Web Servicesp. 254
    Finding Vulnerable Pathways to Accessible Web Serversp. 255
    Acquiring Administrative Access to a Web Serverp. 262
    Physically Accessing an IIS Serverp. 267
    Defacing (Tagging) a Serverp. 268
    Causing Server Congestionp. 272
    Summaryp. 275
    Protecting Web Servicesp. 277
    How Secure Can You Make Your Web Servicesp. 278
    Security Updates for IISp. 278
    Who Needs Access to Your Web Server?p. 281
    From Whom Are You Trying to Protect Your Server?p. 286
    What Are You Trying to Protectp. 289
    Where Are Your Vulnerabilitiesp. 300
    How to Test for Vulnerabilityp. 302
    Monitoring and Logging Server Activitiesp. 302
    Summaryp. 302
    Protecting Other Internet Servicesp. 305
    Overview and Goalsp. 306
    General Planning for Secure Systemsp. 306
    Hardening the Windows 2000 Operating Systemp. 309
    Securing FTP Servicesp. 319
    Securing SMTP Servicesp. 322
    Protecting Windows 2000 DNS Serversp. 326
    Summaryp. 330
    TCP Filtering and Firewallsp. 331
    What Is a Firewall?p. 332
    Types of Firewallsp. 334
    IP Filteringp. 335
    Firewalls for Windows 2000 Enterprisesp. 343
    Personal Firewallsp. 346
    Further Reading on Firewallsp. 348
    Summaryp. 349
    Denial of Servicep. 351
    Overview and Goalsp. 352
    Understanding Denial of Service Attacksp. 352
    DOS Attacks and Preventionp. 358
    Infamous Denial of Service Attacksp. 363
    Protecting Windows 2000 Networks Against Denial of Service Attacksp. 366
    Summaryp. 371
    Spoofingp. 373
    General IP Spoofing Attack Conceptsp. 374
    TCP SYN Flooding and IP Spoofing Attacksp. 375
    Other Types of Spoofing Attacksp. 380
    ARP Spoofingp. 380
    DNS Spoofingp. 382
    Web Spoofingp. 385
    Lower the Vulnerability of Your Web Sitep. 388
    Registry Settings to Help Protect Your Networkp. 388
    Further Reading on Spoofingp. 390
    Summaryp. 391
    Privacy and Encryption in a Windows 2000 Environmentp. 393
    Privacy and Encryption in a Windows 2000 Environmentp. 395
    Basic Privacy Protection Conceptsp. 396
    Cryptography Primerp. 402
    Components of Cryptographyp. 403
    Introduction to Public Key Infrastructure (PKI)p. 406
    Risk Factors to Consider for Windows 2000 Cryptography Featuresp. 419
    Further Reading on PKI and Cryptographyp. 420
    Summaryp. 420
    IPSecp. 421
    Peeping Tom or Protocol Snoopingp. 422
    Privacy, Please!p. 427
    How Did We Do That?p. 433
    The Technical Detailsp. 442
    IPSec Toolsp. 455
    Request for Commentsp. 459
    Summaryp. 460
    Virtual Private Networkingp. 461
    Why Not Call In?p. 462
    Setting Up the VPNp. 465
    Technical Detailsp. 476
    Request for Commentsp. 489
    Summaryp. 490
    Maintaining Windows 2000 Server Securityp. 491
    Log Monitoring and Analysisp. 493
    What Is Logging, Exactly?p. 494
    Default Logging Support in Windows 2000p. 495
    FTP Server Logsp. 506
    IIS Web Server Logsp. 512
    The Performance Logs and Alerts Toolp. 515
    Summaryp. 523
    Intrusion Detectionp. 525
    Types of Intrusion Detection Systemsp. 526
    Detection Methods Used by Intrusion Detection Systemsp. 527
    Common Threats to Networks and Systemsp. 529
    Intrusion Detection Toolsp. 530
    Methods of Evading an Intrusion Detection Systemp. 534
    Methods of Defeating an Intrusion Detection Systemp. 535
    How to Select an Intrusion Detection Systemp. 536
    Further Reading on Intrusion Detectionp. 537
    Honeypotsp. 538
    Summaryp. 541
    Backups and Disaster Recoveryp. 543
    Planning a Backup Strategyp. 544
    Backup and Restore Permissionsp. 546
    Choosing Your Backup Toolsp. 547
    Microsoft Windows Backupp. 547
    Backing Up Your Datap. 558
    mtfcheck: Verifying Backup Tapes from Scriptsp. 561
    regback: Registry Backupp. 562
    regrest: Restoring Registry regback Backupsp. 563
    More Backup Strategiesp. 564
    Summaryp. 565
    Indexp. 567
    Table of Contents provided by Syndetics. All Rights Reserved.

    ISBN: 9780672319655
    ISBN-10: 0672319659
    Series: Maximum Security
    Audience: Tertiary; University or College
    Format: Paperback
    Language: English
    Number Of Pages: 624
    Published: 25th December 2001
    Country of Publication: US
    Dimensions (cm): 23.06 x 18.62  x 3.58
    Weight (kg): 1.0

    Earn 171 Qantas Points
    on this Book