Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
2009-03-02 21:40
344 查看
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.
As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including:
* Describes new technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system.
* Outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment. No GUI needed.
* Describes Windows Server 2008?s security innovations, such as Network Access Protection, Federated Rights Management, and Read-Only Domain Controller
* Includes coverage of monitoring, securing, and troubleshooting Windows Server 2008
* Covers Microsoft?s Hyper-V virtualization technology, which is offered as an add-on to four of the eight versions of Windows Server 2008 and as a stand-alone product
http://rapidshare.com/files/136206436/1597492809.rar http://depositfiles.com/files/7118708
Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.
As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including:
* Describes new technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system.
* Outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment. No GUI needed.
* Describes Windows Server 2008?s security innovations, such as Network Access Protection, Federated Rights Management, and Read-Only Domain Controller
* Includes coverage of monitoring, securing, and troubleshooting Windows Server 2008
* Covers Microsoft?s Hyper-V virtualization technology, which is offered as an add-on to four of the eight versions of Windows Server 2008 and as a stand-alone product
http://rapidshare.com/files/136206436/1597492809.rar http://depositfiles.com/files/7118708
相关文章推荐
- 09. Securing your Web Site with Membership and Login Controls
- 10 Tips to Boost Your Productivity with C# and Visual Studio 2008
- Chapter 1 Securing Your Server and Network(2):管理服务的SIDs
- Chapter 1 Securing Your Server and Network(9):使用Kerberos用于身份验证
- Chapter 1 Securing Your Server and Network(13):配置端点安全性
- Chapter 1 Securing Your Server and Network(14):限制功能——xp_cmdshell 和OPENROWSET
- Windows Server 2008 Datacenter, Enterprise and Standard without Hyper-V (x86) - DVD (Chinese-Simplified) Download
- Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
- Chapter 1 Securing Your Server and Network(3):使用托管服务帐号
- Inbound, outbound, inside and outside
- Chapter 1 Securing Your Server and Network(5):使用SSL加密会话
- Create Windows Server 2008 cluster from the command line
- Chapter 1 Securing Your Server and Network(13):配置端点安全性
- How to determine CPU and memory consumption from inside a process
- 下载详细信息: Documentation for Windows 7 and Windows Server 2008 R2 Service
- Chapter 1 Securing Your Server and Network(3):使用托管服务帐号
- e-Commerce Bot Attacks! Learn How To Protect Your Website From Price Scraping
- please open the options menu from the dashboard and update your name and email——GitHub 提交失败~~解决
- Shared storage cannot protect your application from code injection attacks
- READING NOTE: Inside-Outside Net: Detecting Objects in Context with Skip Pooling and Recurrent Neura