Windows Server 2003 security infrastructures /

Saved in:
Bibliographic Details
Author / Creator:Clercq, Jan de, 1968-
Imprint:Amsterdam ; Boston, Mass. : Digital Press, an imprint of Elsevier, ©2004.
Description:1 online resource
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11140888
Hidden Bibliographic Details
Varying Form of Title:Security
ISBN:0080521126
9780080521121
9781555582838
1555582834
1555582834
Notes:Title from title screen.
Includes index.
Title from book cover on Web Page (viewed Dec. 23, 2005).
Summary:Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS. *Explains nuts and bolts of Windows Server 2003 security *Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures *Draws on the experience of a lead consultant in the Microsoft security area.
Other form:Print version: Clercq, Jan de, 1968- Windows Server 2003 security infrastructures. Amsterdam ; Boston, Mass. : Elsevier Digital Press, ©2004
Table of Contents:
  • Cover
  • Copyright Page
  • Contents
  • Foreword by Tony Redmond
  • Foreword by Mark Mortimore
  • Preface
  • Acknowledgments
  • Chapter 1. The Challenge of Trusted Security Infrastructures
  • 1.1 Introduction
  • 1.2 Positioning trusted security infrastructures
  • 1.3 The fundamental role of trust
  • 1.4 TSI roles
  • 1.5 The long road toward unified TSI solutions
  • 1.6 Microsoft and the challenge of TSIs
  • 1.7 Conclusion
  • Chapter 2. Windows Security Authorities and Principals
  • 2.1 Security authorities
  • 2.2 Security principals
  • Chapter 3. Windows Trust Relationships
  • 3.1 Defining trust relationships
  • 3.2 Trust properties and types
  • 3.3 Trust relationships: Under the hood
  • 3.4 Forest trust
  • 3.5 Trusts and secure channels
  • 3.6 Trusts and firewalls
  • Chapter 4. Introducing Windows Authentication
  • 4.1 Authentication infrastructure terminology
  • 4.2 Qualifying authentication
  • 4.3 Authentication authentication architecture
  • 4.4 Authentication in the Windows machine startup and user logon sequences
  • 4.5 NTLM-based authentication
  • 4.6 Secondary logon service
  • 4.7 Anonymous access
  • 4.8 Credential caching
  • 4.9 General authentication troubleshooting
  • 4.10 What's coming up in the next chapters?
  • Chapter 5. Kerberos
  • 5.1 Introducing Kerberos
  • 5.2 Kerberos: The basic protocol
  • 5.3 Logging on to windows using Kerberos
  • 5.4 Advanced Kerberos topics
  • 5.5 Kerberos configuration
  • 5.6 Kerberos and authentication troubleshooting
  • 5.7 Kerberos interoperability
  • Chapter 6. IIS Authentication
  • 6.1 Secure by default in IIS 6.0
  • 6.2 Introducing IIS authentication
  • 6.3 HTTP authentication
  • 6.4 Integrated Windows authentication
  • 6.5 Passport-based authentication
  • 6.6 Certificate-based authentication
  • 6.7 IIS Authentication method comparison
  • Chapter 7. Microsoft Passport
  • 7.1 Passport-enabling Web technologies
  • 7.2 Passport infrastructure
  • 7.3 Basic passport authentication exchange
  • 7.4 XP and Windows Server 2003 changes
  • 7.5 Passport cookies
  • 7.6 Passport authentication revisited
  • 7.7 Passport and the privacy of user information
  • 7.8 Passport integration in Windows Server 2003
  • 7.9 Passport futures
  • Chapter 8. UNIX and Windows Authentication Interoperability
  • 8.1 Comparing Windows and UNIX authentication
  • 8.2 Interoperability enabling technologies
  • 8.3 UNIX security-related concepts
  • 8.4 Windows and UNIX account management and authentication integration approaches
  • 8.5 Summary
  • Chapter 9. Single Sign-On
  • 9.1 Single sign-on: Pros and cons
  • 9.2 SSO architectures
  • 9.3 Extending SSO
  • 9.4 SSO technologies in Windows Server 2003 and XP
  • 9.5 Summary
  • Chapter 10. Windows Server 2003 Authorization
  • 10.1 Authorization basics
  • 10.2 The Windows authorization model
  • 10.3 Windows 2000 authorization changes
  • 10.4 Windows Server 2003 authorization changes
  • 10.5 Authorization intermediaries
  • T$102.