Protect Your Windows Network: From Perimeter to DataAddison-Wesley Professional, 2005 - 578 pagina's Fully updated and revised, this new edition of Coping with Bipolar Disorder draws on the combined expertise of three leading specialists to offer a comprehensive and practical guide to the causes, treatment, and implications of bipolar disorder, or manic depression. Designed for people with the condition and those close to them, the authors use cognitive behavioural therapy to provide straightforward help with managing and controlling the condition, featuring advice on such key areas as mood monitoring; managing money; housing and social support; and sustaining happy relationships. With real-life case studies, helpful chapter summaries and a full list of support organizations and web groups, this guide will both inform and empower all those who live with the bewildering turbulence of bipolar disorder. Steven Jones is Senior Lecturer in Clinical Psychology at the University of Manchester. Peter Hayward is a Consultant Clinical Psychologist at the South London and Maudsley NHS Trust on in London. Dominic Lam is a Senior Lecturer in Clinical Psychology at the Institute of Psychiatry |
Inhoudsopgave
INTRODUCTION AND FUNDAMENTALS | 1 |
Anatomy of a HackThe Rise and Fall | 27 |
Network Footprinting | 34 |
Initial Compromise | 43 |
Hacking Other Machines | 50 |
Taking Over the Domain | 59 |
Postmortem | 72 |
Rule Number 1 Patch Your Systems | 79 |
Passwords and Other Authentication Mechanisms | 303 |
Password Best Practices | 334 |
Recommended Password Policy | 345 |
PROTECTING HOSTS | 351 |
PROTECTING APPLICATIONS | 393 |
Protecting Services and Server Applications | 415 |
Security for Small Businesses | 447 |
What You Should Do Today | 488 |
POLICIES Procedures and USER AWARENESS | 111 |
Educating Those Pesky Users | 135 |
PHYSICAL AND PERIMETER SECURITY THE FIRST LINE OF DEFENSE | 157 |
Protecting Your Perimeter | 183 |
PROTECTING YOUR Network Inside the Perimeter | 213 |
Network Threat Modeling | 235 |
Preventing Rogue Access Inside the Network | 267 |
Veelvoorkomende woorden en zinsdelen
access control Active Directory actually Administrator account allow application attacker authentication bad guy cached credentials Chapter character set compromised configured connection crack create cross-site scripting database server default dependencies deploy domain controller e-mail Enabled encryption environment exploit Figure filter firewall folder functionality Group Policy hacked host implement install instance Internet IPsec laptop layer LM hash LocalSystem logon machine Microsoft Network Protection NETWORK THREAT MODELING NTLM NTLMv2 operating system option pass phrase passgen password patch perimeter permissions physical security port problem protocol proxy Registry remote require script security policy security updates service account Service Pack someone SQL injection SQL Server stored switch things threat modeling tion tool traffic tweaks vendor vulnerability Web server Windows 9x Windows Server 2003 Windows XP wireless