Least privilege security for Windows 7, Vista, and XP: secure desktops for regulatory compliance and business agility
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK
Packt Pub.
2010
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (xi, 436 pages) illustrations |
ISBN: | 9781849680059 1849680051 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349198 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781849680059 |9 978-1-84968-005-9 | ||
020 | |a 1849680051 |9 1-84968-005-1 | ||
035 | |a (ZDB-4-ITC)ocn712202996 | ||
035 | |a (OCoLC)712202996 | ||
035 | |a (DE-599)BVBBV045349198 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Smith, Russell |e Verfasser |4 aut | |
245 | 1 | 0 | |a Least privilege security for Windows 7, Vista, and XP |b secure desktops for regulatory compliance and business agility |c Russell Smith |
264 | 1 | |a Birmingham, UK |b Packt Pub. |c 2010 | |
300 | |a 1 online resource (xi, 436 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related management technologies. It will provide you with quick solutions for common technical challenges, Microsoft best practice advice, and techniques for managing Least Privilege on the desktop along with details on the impact of Least Privilege Security. The book begins by showing you how to apply Least Privilege Security to different categories of users. | |
505 | 8 | |a You will then prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings. You will identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. This book will help you configure User Account Control on multiple computers using Group Policy and support Least Privilege user accounts using reliable remote access. Then, you will modify legacy applications for Least Privilege Security, achieving the best balance between compatibility and security by using Application Compatibility shims. You will install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). The book will help you implement best practices for working with ActiveX Controls in a managed environment. | |
505 | 8 | |a Finally, you will deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker. A practical handbook containing detailed step-by-step instructions for implementing Least Privilege Security on Windows systems | |
630 | 0 | 4 | |a Microsoft Windows (Computer file) |
650 | 7 | |a Microsoft Windows (Computer file) |2 blmlsh | |
650 | 7 | |a Microsoft Windows (Computer file) |2 fast | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security |a Computer networks |x Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Smith, Russell |t Least privilege security for Windows 7, Vista, and XP. |d [S.l.] : Packt Publishing Limited, 2010 |z 1849680043 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735850 |
Datensatz im Suchindex
_version_ | 1804179172915937280 |
---|---|
any_adam_object | |
author | Smith, Russell |
author_facet | Smith, Russell |
author_role | aut |
author_sort | Smith, Russell |
author_variant | r s rs |
building | Verbundindex |
bvnumber | BV045349198 |
collection | ZDB-4-ITC |
contents | Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related management technologies. It will provide you with quick solutions for common technical challenges, Microsoft best practice advice, and techniques for managing Least Privilege on the desktop along with details on the impact of Least Privilege Security. The book begins by showing you how to apply Least Privilege Security to different categories of users. You will then prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings. You will identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. This book will help you configure User Account Control on multiple computers using Group Policy and support Least Privilege user accounts using reliable remote access. Then, you will modify legacy applications for Least Privilege Security, achieving the best balance between compatibility and security by using Application Compatibility shims. You will install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). The book will help you implement best practices for working with ActiveX Controls in a managed environment. Finally, you will deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker. A practical handbook containing detailed step-by-step instructions for implementing Least Privilege Security on Windows systems |
ctrlnum | (ZDB-4-ITC)ocn712202996 (OCoLC)712202996 (DE-599)BVBBV045349198 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03820nmm a2200457zc 4500</leader><controlfield tag="001">BV045349198</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849680059</subfield><subfield code="9">978-1-84968-005-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849680051</subfield><subfield code="9">1-84968-005-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn712202996</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)712202996</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349198</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Smith, Russell</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Least privilege security for Windows 7, Vista, and XP</subfield><subfield code="b">secure desktops for regulatory compliance and business agility</subfield><subfield code="c">Russell Smith</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xi, 436 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related management technologies. It will provide you with quick solutions for common technical challenges, Microsoft best practice advice, and techniques for managing Least Privilege on the desktop along with details on the impact of Least Privilege Security. The book begins by showing you how to apply Least Privilege Security to different categories of users. </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">You will then prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings. You will identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. This book will help you configure User Account Control on multiple computers using Group Policy and support Least Privilege user accounts using reliable remote access. Then, you will modify legacy applications for Least Privilege Security, achieving the best balance between compatibility and security by using Application Compatibility shims. You will install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). The book will help you implement best practices for working with ActiveX Controls in a managed environment. </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Finally, you will deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker. A practical handbook containing detailed step-by-step instructions for implementing Least Privilege Security on Windows systems</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Smith, Russell</subfield><subfield code="t">Least privilege security for Windows 7, Vista, and XP.</subfield><subfield code="d">[S.l.] : Packt Publishing Limited, 2010</subfield><subfield code="z">1849680043</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735850</subfield></datafield></record></collection> |
id | DE-604.BV045349198 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:39Z |
institution | BVB |
isbn | 9781849680059 1849680051 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735850 |
oclc_num | 712202996 |
open_access_boolean | |
physical | 1 online resource (xi, 436 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Packt Pub. |
record_format | marc |
spelling | Smith, Russell Verfasser aut Least privilege security for Windows 7, Vista, and XP secure desktops for regulatory compliance and business agility Russell Smith Birmingham, UK Packt Pub. 2010 1 online resource (xi, 436 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Print version record Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related management technologies. It will provide you with quick solutions for common technical challenges, Microsoft best practice advice, and techniques for managing Least Privilege on the desktop along with details on the impact of Least Privilege Security. The book begins by showing you how to apply Least Privilege Security to different categories of users. You will then prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings. You will identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. This book will help you configure User Account Control on multiple computers using Group Policy and support Least Privilege user accounts using reliable remote access. Then, you will modify legacy applications for Least Privilege Security, achieving the best balance between compatibility and security by using Application Compatibility shims. You will install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). The book will help you implement best practices for working with ActiveX Controls in a managed environment. Finally, you will deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker. A practical handbook containing detailed step-by-step instructions for implementing Least Privilege Security on Windows systems Microsoft Windows (Computer file) Microsoft Windows (Computer file) blmlsh Microsoft Windows (Computer file) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures Erscheint auch als Druck-Ausgabe Smith, Russell Least privilege security for Windows 7, Vista, and XP. [S.l.] : Packt Publishing Limited, 2010 1849680043 |
spellingShingle | Smith, Russell Least privilege security for Windows 7, Vista, and XP secure desktops for regulatory compliance and business agility Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related management technologies. It will provide you with quick solutions for common technical challenges, Microsoft best practice advice, and techniques for managing Least Privilege on the desktop along with details on the impact of Least Privilege Security. The book begins by showing you how to apply Least Privilege Security to different categories of users. You will then prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings. You will identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. This book will help you configure User Account Control on multiple computers using Group Policy and support Least Privilege user accounts using reliable remote access. Then, you will modify legacy applications for Least Privilege Security, achieving the best balance between compatibility and security by using Application Compatibility shims. You will install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). The book will help you implement best practices for working with ActiveX Controls in a managed environment. Finally, you will deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker. A practical handbook containing detailed step-by-step instructions for implementing Least Privilege Security on Windows systems Microsoft Windows (Computer file) Microsoft Windows (Computer file) blmlsh Microsoft Windows (Computer file) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
title | Least privilege security for Windows 7, Vista, and XP secure desktops for regulatory compliance and business agility |
title_auth | Least privilege security for Windows 7, Vista, and XP secure desktops for regulatory compliance and business agility |
title_exact_search | Least privilege security for Windows 7, Vista, and XP secure desktops for regulatory compliance and business agility |
title_full | Least privilege security for Windows 7, Vista, and XP secure desktops for regulatory compliance and business agility Russell Smith |
title_fullStr | Least privilege security for Windows 7, Vista, and XP secure desktops for regulatory compliance and business agility Russell Smith |
title_full_unstemmed | Least privilege security for Windows 7, Vista, and XP secure desktops for regulatory compliance and business agility Russell Smith |
title_short | Least privilege security for Windows 7, Vista, and XP |
title_sort | least privilege security for windows 7 vista and xp secure desktops for regulatory compliance and business agility |
title_sub | secure desktops for regulatory compliance and business agility |
topic | Microsoft Windows (Computer file) Microsoft Windows (Computer file) blmlsh Microsoft Windows (Computer file) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
topic_facet | Microsoft Windows (Computer file) COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer security Computer networks Security measures |
work_keys_str_mv | AT smithrussell leastprivilegesecurityforwindows7vistaandxpsecuredesktopsforregulatorycomplianceandbusinessagility |