English [en] · CHM · 1.8MB · 2004 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
description
Covering Windows NT, 2000, XP, and 2003, this helpful manual on preventative security measures for the Windows operating system explains how to protect a system against threats and covers such topics as authentication and authorization, Internet Information Server security, group policy, adminstrator security strategies, and more. Original. (Advanced)
An experienced administrator could use this to make sure nothing has been forgotten, and a new administrator would do well to use this as a roadmap. — Tom Duff, Duffbert's Random Musings System administrators know the Internet is a hostile environment. They can't tell when a hacker will attempt to gain access to the SQL server, but they can bet that there will be an attempt soon. Because the operating system is vital to a computer's functioning, and because it's the only layer between the machine's available resources and its users, it's critical that the operating system resist compromise. Hardening Windows is an intermediate to advanced guide to implementing preventative security measures for the Windows operating system, and it's the only book that covers NT, 2000, XP, and 2003. This book is designed to provide a quick and easy checklist-style reference to the steps system administrators need to take to anticipate attacks and compromises, and to harden Windows NT, 2000, XP, and Server 2003 against them.
Alternative description
<p>system Administrators Know The Internet Is A Hostile Environment. They Can't Tell When A Hacker Will Attempt To Gain Access To The Sql Server, But They Can Bet That There Will Be An Attempt Soon. Because The Operating System Is Vital To A Computer's Functioning, And Because It's The Only Layer Between The Machine's Available Resources And Its Users, It's Critical That The Operating System Resist Compromise. <p> Hardening Windows Is An Intermediate To Advanced Guide To Implementing Preventative Security Measures For The Windows Operating System, And It's The Only Book That Covers Nt, 2000, Xp, And 2003. This Book Is Designed To Provide A Quick And Easy Checklist-style Reference To The Steps System Administrators Need To Take To Anticipate Attacks And Compromises, And To Harden Windows Nt, 2000, Xp, And Server 2003 Against Them.</p>
Repository ID for the 'libgen' repository in Libgen.li. Directly taken from the 'libgen_id' field in the 'files' table. Corresponds to the 'thousands folder' torrents.
Repository ID for the non-fiction ('libgen') repository in Libgen.rs. Directly taken from the 'id' field in the 'updated' table. Corresponds to the 'thousands folder' torrents.
Repository ID for the non-fiction ('libgen') repository in Libgen.rs. Directly taken from the 'id' field in the 'updated' table. Corresponds to the 'thousands folder' torrents.
Repository ID for the non-fiction ('libgen') repository in Libgen.rs. Directly taken from the 'id' field in the 'updated' table. Corresponds to the 'thousands folder' torrents.
Libgen.rs Non-Fiction Topic:computers\\operating systems
Libgen’s own classification system of 'topics' for non-fiction books. Obtained from the 'topic' metadata field, using the 'topics' database table, which seems to have its roots in the Kolxo3 library that Libgen was originally based on. https://web.archive.org/web/20250303231041/https://wiki.mhut.org/content:bibliographic_data says that this field will be deprecated in favor of Dewey Decimal.
All download options have the same file, and should be safe to use. That said, always be cautious when downloading files from the internet, especially from sites external to Anna’s Archive. For example, be sure to keep your devices updated.
Support authors and libraries
✍️ If you like this and can afford it, consider buying the original, or supporting the authors directly.
📚 If this is available at your local library, consider borrowing it for free there.
📂 File quality
Help out the community by reporting the quality of this file! 🙌
A “file MD5” is a hash that gets computed from the file contents, and is reasonably unique based on that content. All shadow libraries that we have indexed on here primarily use MD5s to identify files.
A file might appear in multiple shadow libraries. For information about the various datasets that we have compiled, see the Datasets page.