Windows Server 2003 security infrastructures /:
Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston, Mass. :
Digital Press, an imprint of Elsevier,
©2004.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS. *Explains nuts and bolts of Windows Server 2003 security *Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures *Draws on the experience of a lead consultant in the Microsoft security area. |
Beschreibung: | Title from title screen. Includes index. Title from book cover on Web Page (viewed December 23, 2005). |
Beschreibung: | 1 online resource (1 online resource) |
ISBN: | 0080521126 9780080521121 9781555582838 1555582834 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm62740193 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 051223s2004 ne a o 001 0 eng d | ||
040 | |a NTG |b eng |e pn |c NTG |d OCLCG |d OCLCQ |d CDX |d N$T |d YDXCP |d UBY |d IDEBK |d ZCU |d OCLCQ |d B24X7 |d DEBBG |d OCLCQ |d MERUC |d OCLCQ |d OCLCF |d UKDOC |d OCLCQ |d OPELS |d OCLCE |d E7B |d OCLCQ |d AGLDB |d LIV |d OCLCQ |d OCLCA |d STF |d D6H |d OCLCQ |d VTS |d OCLCQ |d OCLCO |d COO |d LEAUB |d M8D |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL |d SXB |d OCLCQ | ||
016 | 7 | |z 1555582834 |2 Uk | |
019 | |a 162594945 |a 171037794 |a 232311862 |a 505058960 |a 507645319 |a 607070052 |a 609292444 |a 856949684 |a 1035679272 | ||
020 | |a 0080521126 |q (electronic bk.) | ||
020 | |a 9780080521121 |q (electronic bk.) | ||
020 | |a 9781555582838 |q (pbk.) | ||
020 | |a 1555582834 |q (pbk.) | ||
020 | |z 1555582834 | ||
035 | |a (OCoLC)62740193 |z (OCoLC)162594945 |z (OCoLC)171037794 |z (OCoLC)232311862 |z (OCoLC)505058960 |z (OCoLC)507645319 |z (OCoLC)607070052 |z (OCoLC)609292444 |z (OCoLC)856949684 |z (OCoLC)1035679272 | ||
037 | |a 98317:98319 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a QA76.76.O63 |b C555 2004b | |
072 | 7 | |a COM |x 083000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Clercq, Jan de, |d 1968- |1 https://id.oclc.org/worldcat/entity/E39PCjrxrjB9JFh49BhKJbrRmm |0 http://id.loc.gov/authorities/names/no2004044270 | |
245 | 1 | 0 | |a Windows Server 2003 security infrastructures / |c Jan de Clercq. |
246 | 3 | 0 | |a Security |
260 | |a Amsterdam ; |a Boston, Mass. : |b Digital Press, an imprint of Elsevier, |c ©2004. | ||
300 | |a 1 online resource (1 online resource) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Title from title screen. | ||
500 | |a Includes index. | ||
500 | |a Title from book cover on Web Page (viewed December 23, 2005). | ||
505 | 0 | |a Cover -- Copyright Page -- Contents -- Foreword by Tony Redmond -- Foreword by Mark Mortimore -- Preface -- Acknowledgments -- Chapter 1. The Challenge of Trusted Security Infrastructures -- 1.1 Introduction -- 1.2 Positioning trusted security infrastructures -- 1.3 The fundamental role of trust -- 1.4 TSI roles -- 1.5 The long road toward unified TSI solutions -- 1.6 Microsoft and the challenge of TSIs -- 1.7 Conclusion -- Chapter 2. Windows Security Authorities and Principals -- 2.1 Security authorities -- 2.2 Security principals -- Chapter 3. Windows Trust Relationships -- 3.1 Defining trust relationships -- 3.2 Trust properties and types -- 3.3 Trust relationships: Under the hood -- 3.4 Forest trust -- 3.5 Trusts and secure channels -- 3.6 Trusts and firewalls -- Chapter 4. Introducing Windows Authentication -- 4.1 Authentication infrastructure terminology -- 4.2 Qualifying authentication -- 4.3 Authentication authentication architecture -- 4.4 Authentication in the Windows machine startup and user logon sequences -- 4.5 NTLM-based authentication -- 4.6 Secondary logon service -- 4.7 Anonymous access -- 4.8 Credential caching -- 4.9 General authentication troubleshooting -- 4.10 What's coming up in the next chapters? -- Chapter 5. Kerberos -- 5.1 Introducing Kerberos -- 5.2 Kerberos: The basic protocol -- 5.3 Logging on to windows using Kerberos -- 5.4 Advanced Kerberos topics -- 5.5 Kerberos configuration -- 5.6 Kerberos and authentication troubleshooting -- 5.7 Kerberos interoperability -- Chapter 6. IIS Authentication -- 6.1 Secure by default in IIS 6.0 -- 6.2 Introducing IIS authentication -- 6.3 HTTP authentication -- 6.4 Integrated Windows authentication -- 6.5 Passport-based authentication -- 6.6 Certificate-based authentication -- 6.7 IIS Authentication method comparison -- Chapter 7. Microsoft Passport -- 7.1 Passport-enabling Web technologies -- 7.2 Passport infrastructure -- 7.3 Basic passport authentication exchange -- 7.4 XP and Windows Server 2003 changes -- 7.5 Passport cookies -- 7.6 Passport authentication revisited -- 7.7 Passport and the privacy of user information -- 7.8 Passport integration in Windows Server 2003 -- 7.9 Passport futures -- Chapter 8. UNIX and Windows Authentication Interoperability -- 8.1 Comparing Windows and UNIX authentication -- 8.2 Interoperability enabling technologies -- 8.3 UNIX security-related concepts -- 8.4 Windows and UNIX account management and authentication integration approaches -- 8.5 Summary -- Chapter 9. Single Sign-On -- 9.1 Single sign-on: Pros and cons -- 9.2 SSO architectures -- 9.3 Extending SSO -- 9.4 SSO technologies in Windows Server 2003 and XP -- 9.5 Summary -- Chapter 10. Windows Server 2003 Authorization -- 10.1 Authorization basics -- 10.2 The Windows authorization model -- 10.3 Windows 2000 authorization changes -- 10.4 Windows Server 2003 authorization changes -- 10.5 Authorization intermediaries -- T$102. | |
520 | |a Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS. *Explains nuts and bolts of Windows Server 2003 security *Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures *Draws on the experience of a lead consultant in the Microsoft security area. | ||
630 | 0 | 0 | |a Microsoft Windows server. |0 http://id.loc.gov/authorities/names/n99003751 |
630 | 0 | 7 | |a Microsoft Windows server |2 fast |
650 | 0 | |a Operating systems (Computers) |0 http://id.loc.gov/authorities/subjects/sh85094982 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 6 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a operating systems. |2 aat | |
650 | 7 | |a COMPUTERS |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Operating systems (Computers) |2 fast | |
758 | |i has work: |a Windows Server 2003 security infrastructures (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH9krjKxj38BXGCw9G7pGd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Clercq, Jan de, 1968- |t Windows Server 2003 security infrastructures. |d Amsterdam ; Boston, Mass. : Elsevier Digital Press, ©2004 |w (DLC) 2004273211 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555582838 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555582838 |3 Volltext | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196565 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196565 |3 Volltext | |
938 | |a 123Library |b 123L |n 34550 | ||
938 | |a Books 24x7 |b B247 |n bks00003843 | ||
938 | |a Coutts Information Services |b COUT |n 6483579 |c 49.90 GBP | ||
938 | |a ebrary |b EBRY |n ebr10175481 | ||
938 | |a EBSCOhost |b EBSC |n 196565 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 102261 | ||
938 | |a YBP Library Services |b YANK |n 2614094 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm62740193 |
---|---|
_version_ | 1813903287588487168 |
adam_text | |
any_adam_object | |
author | Clercq, Jan de, 1968- |
author_GND | http://id.loc.gov/authorities/names/no2004044270 |
author_facet | Clercq, Jan de, 1968- |
author_role | |
author_sort | Clercq, Jan de, 1968- |
author_variant | j d c jd jdc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.O63 C555 2004b |
callnumber-search | QA76.76.O63 C555 2004b |
callnumber-sort | QA 276.76 O63 C555 42004B |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover -- Copyright Page -- Contents -- Foreword by Tony Redmond -- Foreword by Mark Mortimore -- Preface -- Acknowledgments -- Chapter 1. The Challenge of Trusted Security Infrastructures -- 1.1 Introduction -- 1.2 Positioning trusted security infrastructures -- 1.3 The fundamental role of trust -- 1.4 TSI roles -- 1.5 The long road toward unified TSI solutions -- 1.6 Microsoft and the challenge of TSIs -- 1.7 Conclusion -- Chapter 2. Windows Security Authorities and Principals -- 2.1 Security authorities -- 2.2 Security principals -- Chapter 3. Windows Trust Relationships -- 3.1 Defining trust relationships -- 3.2 Trust properties and types -- 3.3 Trust relationships: Under the hood -- 3.4 Forest trust -- 3.5 Trusts and secure channels -- 3.6 Trusts and firewalls -- Chapter 4. Introducing Windows Authentication -- 4.1 Authentication infrastructure terminology -- 4.2 Qualifying authentication -- 4.3 Authentication authentication architecture -- 4.4 Authentication in the Windows machine startup and user logon sequences -- 4.5 NTLM-based authentication -- 4.6 Secondary logon service -- 4.7 Anonymous access -- 4.8 Credential caching -- 4.9 General authentication troubleshooting -- 4.10 What's coming up in the next chapters? -- Chapter 5. Kerberos -- 5.1 Introducing Kerberos -- 5.2 Kerberos: The basic protocol -- 5.3 Logging on to windows using Kerberos -- 5.4 Advanced Kerberos topics -- 5.5 Kerberos configuration -- 5.6 Kerberos and authentication troubleshooting -- 5.7 Kerberos interoperability -- Chapter 6. IIS Authentication -- 6.1 Secure by default in IIS 6.0 -- 6.2 Introducing IIS authentication -- 6.3 HTTP authentication -- 6.4 Integrated Windows authentication -- 6.5 Passport-based authentication -- 6.6 Certificate-based authentication -- 6.7 IIS Authentication method comparison -- Chapter 7. Microsoft Passport -- 7.1 Passport-enabling Web technologies -- 7.2 Passport infrastructure -- 7.3 Basic passport authentication exchange -- 7.4 XP and Windows Server 2003 changes -- 7.5 Passport cookies -- 7.6 Passport authentication revisited -- 7.7 Passport and the privacy of user information -- 7.8 Passport integration in Windows Server 2003 -- 7.9 Passport futures -- Chapter 8. UNIX and Windows Authentication Interoperability -- 8.1 Comparing Windows and UNIX authentication -- 8.2 Interoperability enabling technologies -- 8.3 UNIX security-related concepts -- 8.4 Windows and UNIX account management and authentication integration approaches -- 8.5 Summary -- Chapter 9. Single Sign-On -- 9.1 Single sign-on: Pros and cons -- 9.2 SSO architectures -- 9.3 Extending SSO -- 9.4 SSO technologies in Windows Server 2003 and XP -- 9.5 Summary -- Chapter 10. Windows Server 2003 Authorization -- 10.1 Authorization basics -- 10.2 The Windows authorization model -- 10.3 Windows 2000 authorization changes -- 10.4 Windows Server 2003 authorization changes -- 10.5 Authorization intermediaries -- T$102. |
ctrlnum | (OCoLC)62740193 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07236cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm62740193 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">051223s2004 ne a o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NTG</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">NTG</subfield><subfield code="d">OCLCG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CDX</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">UBY</subfield><subfield code="d">IDEBK</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UKDOC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">OCLCE</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="z">1555582834</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">162594945</subfield><subfield code="a">171037794</subfield><subfield code="a">232311862</subfield><subfield code="a">505058960</subfield><subfield code="a">507645319</subfield><subfield code="a">607070052</subfield><subfield code="a">609292444</subfield><subfield code="a">856949684</subfield><subfield code="a">1035679272</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080521126</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080521121</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555582838</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555582834</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1555582834</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)62740193</subfield><subfield code="z">(OCoLC)162594945</subfield><subfield code="z">(OCoLC)171037794</subfield><subfield code="z">(OCoLC)232311862</subfield><subfield code="z">(OCoLC)505058960</subfield><subfield code="z">(OCoLC)507645319</subfield><subfield code="z">(OCoLC)607070052</subfield><subfield code="z">(OCoLC)609292444</subfield><subfield code="z">(OCoLC)856949684</subfield><subfield code="z">(OCoLC)1035679272</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">98317:98319</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.O63</subfield><subfield code="b">C555 2004b</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">083000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Clercq, Jan de,</subfield><subfield code="d">1968-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjrxrjB9JFh49BhKJbrRmm</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004044270</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Windows Server 2003 security infrastructures /</subfield><subfield code="c">Jan de Clercq.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Security</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston, Mass. :</subfield><subfield code="b">Digital Press, an imprint of Elsevier,</subfield><subfield code="c">©2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from book cover on Web Page (viewed December 23, 2005).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Copyright Page -- Contents -- Foreword by Tony Redmond -- Foreword by Mark Mortimore -- Preface -- Acknowledgments -- Chapter 1. The Challenge of Trusted Security Infrastructures -- 1.1 Introduction -- 1.2 Positioning trusted security infrastructures -- 1.3 The fundamental role of trust -- 1.4 TSI roles -- 1.5 The long road toward unified TSI solutions -- 1.6 Microsoft and the challenge of TSIs -- 1.7 Conclusion -- Chapter 2. Windows Security Authorities and Principals -- 2.1 Security authorities -- 2.2 Security principals -- Chapter 3. Windows Trust Relationships -- 3.1 Defining trust relationships -- 3.2 Trust properties and types -- 3.3 Trust relationships: Under the hood -- 3.4 Forest trust -- 3.5 Trusts and secure channels -- 3.6 Trusts and firewalls -- Chapter 4. Introducing Windows Authentication -- 4.1 Authentication infrastructure terminology -- 4.2 Qualifying authentication -- 4.3 Authentication authentication architecture -- 4.4 Authentication in the Windows machine startup and user logon sequences -- 4.5 NTLM-based authentication -- 4.6 Secondary logon service -- 4.7 Anonymous access -- 4.8 Credential caching -- 4.9 General authentication troubleshooting -- 4.10 What's coming up in the next chapters? -- Chapter 5. Kerberos -- 5.1 Introducing Kerberos -- 5.2 Kerberos: The basic protocol -- 5.3 Logging on to windows using Kerberos -- 5.4 Advanced Kerberos topics -- 5.5 Kerberos configuration -- 5.6 Kerberos and authentication troubleshooting -- 5.7 Kerberos interoperability -- Chapter 6. IIS Authentication -- 6.1 Secure by default in IIS 6.0 -- 6.2 Introducing IIS authentication -- 6.3 HTTP authentication -- 6.4 Integrated Windows authentication -- 6.5 Passport-based authentication -- 6.6 Certificate-based authentication -- 6.7 IIS Authentication method comparison -- Chapter 7. Microsoft Passport -- 7.1 Passport-enabling Web technologies -- 7.2 Passport infrastructure -- 7.3 Basic passport authentication exchange -- 7.4 XP and Windows Server 2003 changes -- 7.5 Passport cookies -- 7.6 Passport authentication revisited -- 7.7 Passport and the privacy of user information -- 7.8 Passport integration in Windows Server 2003 -- 7.9 Passport futures -- Chapter 8. UNIX and Windows Authentication Interoperability -- 8.1 Comparing Windows and UNIX authentication -- 8.2 Interoperability enabling technologies -- 8.3 UNIX security-related concepts -- 8.4 Windows and UNIX account management and authentication integration approaches -- 8.5 Summary -- Chapter 9. Single Sign-On -- 9.1 Single sign-on: Pros and cons -- 9.2 SSO architectures -- 9.3 Extending SSO -- 9.4 SSO technologies in Windows Server 2003 and XP -- 9.5 Summary -- Chapter 10. Windows Server 2003 Authorization -- 10.1 Authorization basics -- 10.2 The Windows authorization model -- 10.3 Windows 2000 authorization changes -- 10.4 Windows Server 2003 authorization changes -- 10.5 Authorization intermediaries -- T$102.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS. *Explains nuts and bolts of Windows Server 2003 security *Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures *Draws on the experience of a lead consultant in the Microsoft security area.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Windows server.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n99003751</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Windows server</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85094982</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">operating systems.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Cryptography.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Operating systems (Computers)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Windows Server 2003 security infrastructures (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCH9krjKxj38BXGCw9G7pGd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Clercq, Jan de, 1968-</subfield><subfield code="t">Windows Server 2003 security infrastructures.</subfield><subfield code="d">Amsterdam ; Boston, Mass. : Elsevier Digital Press, ©2004</subfield><subfield code="w">(DLC) 2004273211</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555582838</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555582838</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196565</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196565</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">34550</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00003843</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">6483579</subfield><subfield code="c">49.90 GBP</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10175481</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">196565</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">102261</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2614094</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm62740193 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:16:17Z |
institution | BVB |
isbn | 0080521126 9780080521121 9781555582838 1555582834 |
language | English |
oclc_num | 62740193 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (1 online resource) |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Digital Press, an imprint of Elsevier, |
record_format | marc |
spelling | Clercq, Jan de, 1968- https://id.oclc.org/worldcat/entity/E39PCjrxrjB9JFh49BhKJbrRmm http://id.loc.gov/authorities/names/no2004044270 Windows Server 2003 security infrastructures / Jan de Clercq. Security Amsterdam ; Boston, Mass. : Digital Press, an imprint of Elsevier, ©2004. 1 online resource (1 online resource) text txt rdacontent computer c rdamedia online resource cr rdacarrier Title from title screen. Includes index. Title from book cover on Web Page (viewed December 23, 2005). Cover -- Copyright Page -- Contents -- Foreword by Tony Redmond -- Foreword by Mark Mortimore -- Preface -- Acknowledgments -- Chapter 1. The Challenge of Trusted Security Infrastructures -- 1.1 Introduction -- 1.2 Positioning trusted security infrastructures -- 1.3 The fundamental role of trust -- 1.4 TSI roles -- 1.5 The long road toward unified TSI solutions -- 1.6 Microsoft and the challenge of TSIs -- 1.7 Conclusion -- Chapter 2. Windows Security Authorities and Principals -- 2.1 Security authorities -- 2.2 Security principals -- Chapter 3. Windows Trust Relationships -- 3.1 Defining trust relationships -- 3.2 Trust properties and types -- 3.3 Trust relationships: Under the hood -- 3.4 Forest trust -- 3.5 Trusts and secure channels -- 3.6 Trusts and firewalls -- Chapter 4. Introducing Windows Authentication -- 4.1 Authentication infrastructure terminology -- 4.2 Qualifying authentication -- 4.3 Authentication authentication architecture -- 4.4 Authentication in the Windows machine startup and user logon sequences -- 4.5 NTLM-based authentication -- 4.6 Secondary logon service -- 4.7 Anonymous access -- 4.8 Credential caching -- 4.9 General authentication troubleshooting -- 4.10 What's coming up in the next chapters? -- Chapter 5. Kerberos -- 5.1 Introducing Kerberos -- 5.2 Kerberos: The basic protocol -- 5.3 Logging on to windows using Kerberos -- 5.4 Advanced Kerberos topics -- 5.5 Kerberos configuration -- 5.6 Kerberos and authentication troubleshooting -- 5.7 Kerberos interoperability -- Chapter 6. IIS Authentication -- 6.1 Secure by default in IIS 6.0 -- 6.2 Introducing IIS authentication -- 6.3 HTTP authentication -- 6.4 Integrated Windows authentication -- 6.5 Passport-based authentication -- 6.6 Certificate-based authentication -- 6.7 IIS Authentication method comparison -- Chapter 7. Microsoft Passport -- 7.1 Passport-enabling Web technologies -- 7.2 Passport infrastructure -- 7.3 Basic passport authentication exchange -- 7.4 XP and Windows Server 2003 changes -- 7.5 Passport cookies -- 7.6 Passport authentication revisited -- 7.7 Passport and the privacy of user information -- 7.8 Passport integration in Windows Server 2003 -- 7.9 Passport futures -- Chapter 8. UNIX and Windows Authentication Interoperability -- 8.1 Comparing Windows and UNIX authentication -- 8.2 Interoperability enabling technologies -- 8.3 UNIX security-related concepts -- 8.4 Windows and UNIX account management and authentication integration approaches -- 8.5 Summary -- Chapter 9. Single Sign-On -- 9.1 Single sign-on: Pros and cons -- 9.2 SSO architectures -- 9.3 Extending SSO -- 9.4 SSO technologies in Windows Server 2003 and XP -- 9.5 Summary -- Chapter 10. Windows Server 2003 Authorization -- 10.1 Authorization basics -- 10.2 The Windows authorization model -- 10.3 Windows 2000 authorization changes -- 10.4 Windows Server 2003 authorization changes -- 10.5 Authorization intermediaries -- T$102. Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS. *Explains nuts and bolts of Windows Server 2003 security *Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures *Draws on the experience of a lead consultant in the Microsoft security area. Microsoft Windows server. http://id.loc.gov/authorities/names/n99003751 Microsoft Windows server fast Operating systems (Computers) http://id.loc.gov/authorities/subjects/sh85094982 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Systèmes d'exploitation (Ordinateurs) Sécurité informatique. operating systems. aat COMPUTERS Security Cryptography. bisacsh Computer security fast Operating systems (Computers) fast has work: Windows Server 2003 security infrastructures (Text) https://id.oclc.org/worldcat/entity/E39PCH9krjKxj38BXGCw9G7pGd https://id.oclc.org/worldcat/ontology/hasWork Print version: Clercq, Jan de, 1968- Windows Server 2003 security infrastructures. Amsterdam ; Boston, Mass. : Elsevier Digital Press, ©2004 (DLC) 2004273211 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781555582838 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781555582838 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196565 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196565 Volltext |
spellingShingle | Clercq, Jan de, 1968- Windows Server 2003 security infrastructures / Cover -- Copyright Page -- Contents -- Foreword by Tony Redmond -- Foreword by Mark Mortimore -- Preface -- Acknowledgments -- Chapter 1. The Challenge of Trusted Security Infrastructures -- 1.1 Introduction -- 1.2 Positioning trusted security infrastructures -- 1.3 The fundamental role of trust -- 1.4 TSI roles -- 1.5 The long road toward unified TSI solutions -- 1.6 Microsoft and the challenge of TSIs -- 1.7 Conclusion -- Chapter 2. Windows Security Authorities and Principals -- 2.1 Security authorities -- 2.2 Security principals -- Chapter 3. Windows Trust Relationships -- 3.1 Defining trust relationships -- 3.2 Trust properties and types -- 3.3 Trust relationships: Under the hood -- 3.4 Forest trust -- 3.5 Trusts and secure channels -- 3.6 Trusts and firewalls -- Chapter 4. Introducing Windows Authentication -- 4.1 Authentication infrastructure terminology -- 4.2 Qualifying authentication -- 4.3 Authentication authentication architecture -- 4.4 Authentication in the Windows machine startup and user logon sequences -- 4.5 NTLM-based authentication -- 4.6 Secondary logon service -- 4.7 Anonymous access -- 4.8 Credential caching -- 4.9 General authentication troubleshooting -- 4.10 What's coming up in the next chapters? -- Chapter 5. Kerberos -- 5.1 Introducing Kerberos -- 5.2 Kerberos: The basic protocol -- 5.3 Logging on to windows using Kerberos -- 5.4 Advanced Kerberos topics -- 5.5 Kerberos configuration -- 5.6 Kerberos and authentication troubleshooting -- 5.7 Kerberos interoperability -- Chapter 6. IIS Authentication -- 6.1 Secure by default in IIS 6.0 -- 6.2 Introducing IIS authentication -- 6.3 HTTP authentication -- 6.4 Integrated Windows authentication -- 6.5 Passport-based authentication -- 6.6 Certificate-based authentication -- 6.7 IIS Authentication method comparison -- Chapter 7. Microsoft Passport -- 7.1 Passport-enabling Web technologies -- 7.2 Passport infrastructure -- 7.3 Basic passport authentication exchange -- 7.4 XP and Windows Server 2003 changes -- 7.5 Passport cookies -- 7.6 Passport authentication revisited -- 7.7 Passport and the privacy of user information -- 7.8 Passport integration in Windows Server 2003 -- 7.9 Passport futures -- Chapter 8. UNIX and Windows Authentication Interoperability -- 8.1 Comparing Windows and UNIX authentication -- 8.2 Interoperability enabling technologies -- 8.3 UNIX security-related concepts -- 8.4 Windows and UNIX account management and authentication integration approaches -- 8.5 Summary -- Chapter 9. Single Sign-On -- 9.1 Single sign-on: Pros and cons -- 9.2 SSO architectures -- 9.3 Extending SSO -- 9.4 SSO technologies in Windows Server 2003 and XP -- 9.5 Summary -- Chapter 10. Windows Server 2003 Authorization -- 10.1 Authorization basics -- 10.2 The Windows authorization model -- 10.3 Windows 2000 authorization changes -- 10.4 Windows Server 2003 authorization changes -- 10.5 Authorization intermediaries -- T$102. Microsoft Windows server. http://id.loc.gov/authorities/names/n99003751 Microsoft Windows server fast Operating systems (Computers) http://id.loc.gov/authorities/subjects/sh85094982 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Systèmes d'exploitation (Ordinateurs) Sécurité informatique. operating systems. aat COMPUTERS Security Cryptography. bisacsh Computer security fast Operating systems (Computers) fast |
subject_GND | http://id.loc.gov/authorities/names/n99003751 http://id.loc.gov/authorities/subjects/sh85094982 http://id.loc.gov/authorities/subjects/sh90001862 |
title | Windows Server 2003 security infrastructures / |
title_alt | Security |
title_auth | Windows Server 2003 security infrastructures / |
title_exact_search | Windows Server 2003 security infrastructures / |
title_full | Windows Server 2003 security infrastructures / Jan de Clercq. |
title_fullStr | Windows Server 2003 security infrastructures / Jan de Clercq. |
title_full_unstemmed | Windows Server 2003 security infrastructures / Jan de Clercq. |
title_short | Windows Server 2003 security infrastructures / |
title_sort | windows server 2003 security infrastructures |
topic | Microsoft Windows server. http://id.loc.gov/authorities/names/n99003751 Microsoft Windows server fast Operating systems (Computers) http://id.loc.gov/authorities/subjects/sh85094982 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Systèmes d'exploitation (Ordinateurs) Sécurité informatique. operating systems. aat COMPUTERS Security Cryptography. bisacsh Computer security fast Operating systems (Computers) fast |
topic_facet | Microsoft Windows server. Microsoft Windows server Operating systems (Computers) Computer security. Systèmes d'exploitation (Ordinateurs) Sécurité informatique. operating systems. COMPUTERS Security Cryptography. Computer security |
url | https://www.sciencedirect.com/science/book/9781555582838 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196565 |
work_keys_str_mv | AT clercqjande windowsserver2003securityinfrastructures AT clercqjande security |