
Windows 2000 Security Handbook
by Cox, Philip; Sheldon, TomRent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Table of Contents
Security 101. TCP is King. Security Threats. Countermeasures. Security Policies and Management. Windows 2000 Security. An Overview of Windows 2000 Security. Network Protocols and Services in Win2K. Windows 2000 Security Risks and Solutions. Securing Windows 2000. Active Directory. Group Policies. User and Group Security Management. Logon and Authentication. File System and Network Share Security. Auditing. Securing Windows 2000 Networks. Firewalls and Proxy Servers. Microsoft Proxy Server. Remote Access and Virtual Private Networks. Client/Workstation Security. Enterprise-Wide Security. Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
Security Threats. Countermeasures. Security Policies and Management. Windows 2000 Security. An Overview of Windows 2000 Security. Network Protocols and Services in Win2K. Windows 2000 Security Risks and Solutions. Securing Windows 2000. Active Directory. Group Policies. User and Group Security Management. Logon and Authentication. File System and Network Share Security. Auditing. Securing Windows 2000 Networks. Firewalls and Proxy Servers. Microsoft Proxy Server. Remote Access and Virtual Private Networks. Client/Workstation Security. Enterprise-Wide Security. Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
Security Policies and Management. Windows 2000 Security. An Overview of Windows 2000 Security. Network Protocols and Services in Win2K. Windows 2000 Security Risks and Solutions. Securing Windows 2000. Active Directory. Group Policies. User and Group Security Management. Logon and Authentication. File System and Network Share Security. Auditing. Securing Windows 2000 Networks. Firewalls and Proxy Servers. Microsoft Proxy Server. Remote Access and Virtual Private Networks. Client/Workstation Security. Enterprise-Wide Security. Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
An Overview of Windows 2000 Security. Network Protocols and Services in Win2K. Windows 2000 Security Risks and Solutions. Securing Windows 2000. Active Directory. Group Policies. User and Group Security Management. Logon and Authentication. File System and Network Share Security. Auditing. Securing Windows 2000 Networks. Firewalls and Proxy Servers. Microsoft Proxy Server. Remote Access and Virtual Private Networks. Client/Workstation Security. Enterprise-Wide Security. Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
Windows 2000 Security Risks and Solutions. Securing Windows 2000. Active Directory. Group Policies. User and Group Security Management. Logon and Authentication. File System and Network Share Security. Auditing. Securing Windows 2000 Networks. Firewalls and Proxy Servers. Microsoft Proxy Server. Remote Access and Virtual Private Networks. Client/Workstation Security. Enterprise-Wide Security. Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
Active Directory. Group Policies. User and Group Security Management. Logon and Authentication. File System and Network Share Security. Auditing. Securing Windows 2000 Networks. Firewalls and Proxy Servers. Microsoft Proxy Server. Remote Access and Virtual Private Networks. Client/Workstation Security. Enterprise-Wide Security. Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
User and Group Security Management. Logon and Authentication. File System and Network Share Security. Auditing. Securing Windows 2000 Networks. Firewalls and Proxy Servers. Microsoft Proxy Server. Remote Access and Virtual Private Networks. Client/Workstation Security. Enterprise-Wide Security. Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
File System and Network Share Security. Auditing. Securing Windows 2000 Networks. Firewalls and Proxy Servers. Microsoft Proxy Server. Remote Access and Virtual Private Networks. Client/Workstation Security. Enterprise-Wide Security. Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
Securing Windows 2000 Networks. Firewalls and Proxy Servers. Microsoft Proxy Server. Remote Access and Virtual Private Networks. Client/Workstation Security. Enterprise-Wide Security. Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
Microsoft Proxy Server. Remote Access and Virtual Private Networks. Client/Workstation Security. Enterprise-Wide Security. Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
Client/Workstation Security. Enterprise-Wide Security. Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
Other Issues. Securing the Microsoft Internet Information Server. Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
Fault Tolerance and Data Protection. Hardening Windows 2000. Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
Appendixes. Mangement, Monitoring, and Auditing. Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
Internet Security and Acceleration (ISA) Server. Intrusion Detection Systems.
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.