Protect Your Windows Network: From Perimeter to Data

Voorkant
Addison-Wesley Professional, 2005 - 578 pagina's
Fully updated and revised, this new edition of Coping with Bipolar Disorder draws on the combined expertise of three leading specialists to offer a comprehensive and practical guide to the causes, treatment, and implications of bipolar disorder, or manic depression. Designed for people with the condition and those close to them, the authors use cognitive behavioural therapy to provide straightforward help with managing and controlling the condition, featuring advice on such key areas as mood monitoring; managing money; housing and social support; and sustaining happy relationships. With real-life case studies, helpful chapter summaries and a full list of support organizations and web groups, this guide will both inform and empower all those who live with the bewildering turbulence of bipolar disorder. Steven Jones is Senior Lecturer in Clinical Psychology at the University of Manchester. Peter Hayward is a Consultant Clinical Psychologist at the South London and Maudsley NHS Trust on in London. Dominic Lam is a Senior Lecturer in Clinical Psychology at the Institute of Psychiatry
 

Geselecteerde pagina's

Inhoudsopgave

INTRODUCTION AND FUNDAMENTALS
1
Anatomy of a HackThe Rise and Fall
27
Network Footprinting
34
Initial Compromise
43
Hacking Other Machines
50
Taking Over the Domain
59
Postmortem
72
Rule Number 1 Patch Your Systems
79
Passwords and Other Authentication Mechanisms
303
Password Best Practices
334
Recommended Password Policy
345
PROTECTING HOSTS
351
PROTECTING APPLICATIONS
393
Protecting Services and Server Applications
415
Security for Small Businesses
447
What You Should Do Today
488

POLICIES Procedures and USER AWARENESS
111
Educating Those Pesky Users
135
PHYSICAL AND PERIMETER SECURITY THE FIRST LINE OF DEFENSE
157
Protecting Your Perimeter
183
PROTECTING YOUR Network Inside the Perimeter
213
Network Threat Modeling
235
Preventing Rogue Access Inside the Network
267
How to Get Your Network Hacked in 10 Easy Steps
521
HOSTS file to Block Spyware
527
Password Generator Tool
529
10 Immutable Laws of Security
541
Index
551
Copyright

Veelvoorkomende woorden en zinsdelen

Bibliografische gegevens