List of Tables - Windows Server 2003 Network Security Design Study Guide (Exam 70-298) [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Windows Server 2003 Network Security Design Study Guide (Exam 70-298) [Electronic resources] - نسخه متنی

Brian Reisman, Mitch Ruebush

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید







List of Tables



Chapter 2: Identifying and Designing for Potential Security Threats




Table 2.1: Common Network Vulnerabilities



Table 2.2: Predicted Threats Based on STRIDE Model



Table 2.3: Severity Classification Example




Chapter 3: Designing Network Infrastructure Security




Table 3.1: Common Attacks to Data Transferred across a Network




Chapter 4: Designing an Authentication Strategy for Active Directory




Table 4.1: Table 4.2 LAN Manager Compatibility Levels



Table 4.2: Windows Group Types




Chapter 5: Designing an Access Control Strategy for Network Resources




Table 5.1: Windows Access Control Model



Table 5.2: Active Directory Standard Permissions



Table 5.3: Administrative Shares



Table 5.5: Common Auditing Resources and Utilities



Table 5.4: Audit Statement Example




Chapter 6: Designing a Public Key Infrastructure with Certificate Services




Table 6.1: Available Certificate Templates



Table 6.2: Common Technologies That Rely on Certificates




Chapter 7: Designing Security for Internet Information Services




Table 7.1: List of Services Installed by Default on Windows Server 2003



Table 7.2: List of Services in the Application Server dialog box Service Description



Table 7.3: Web Service Extensions and their Common Extensions.




Chapter 8: Designing Security for Servers with Specific Roles




Table 8.1: Table 8.1 Predefined security templates




Chapter 9: Designing an Infrastructure for Updating Computers




Table 9.1: Default Administrative Templates



Table 9.2: Security Update Methods




/ 168