05410nam 2200661 a 450 991045883160332120200520144314.01-281-11264-X97866111126460-08-055614-0(CKB)1000000000383558(EBL)328623(OCoLC)476126396(SSID)ssj0000202588(PQKBManifestationID)11200562(PQKBTitleCode)TC0000202588(PQKBWorkID)10255156(PQKB)11282898(MiAaPQ)EBC328623(CaSebORM)9781597491396(Au-PeEL)EBL328623(CaPaEBR)ebr10204359(CaONFJC)MIL111264(EXLCZ)99100000000038355820070420d2007 uy 0engur|n|---|||||txtccrMicrosoft Vista for IT security professionals[electronic resource] /Anthony Piltzecker, technical editor ; Larry Chaffin ... [et al.]1st editionRockland, Mass. Syngress Publishingc20071 online resource (673 p.)Description based upon print version of record.1-59749-139-X Includes bibliographical references and index.Front Cover; Vista for IT Security Professionals; Copyright Page; Contents; Foreword; About the CD; Chapter 1. Microsoft Vista: An Overview; Introduction; The User Interface; Internet Explorer 7; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Microsoft Vista: The Battle Against Malware Lives On; Introduction; Malware Fundamentals; Improvements in Internet Explorer 7; Windows Security Center; Windows Defender; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Microsoft Vista: Securing User Access; Introduction; Access Control FundamentalsImproving the Logon ArchitectureUser Account Control; Remote Assistance; Network Access Protection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Microsoft Vista: Trusted Platform Module Services; Introduction; Understanding the TPM; Configuring and Managing the TPM on a Stand-Alone System; Configuring and Managing the TPM in an Enterprise Environment; TPM Applications; Understanding the Security Implications of the TPM; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Microsoft Vista: Data Protection; Introduction; USB Devices; Rights ManagementEncrypting File SystemWhole-Disk Encryption; PatchGuard; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Microsoft Vista: Networking Essentials; Introduction; Not Your Father's TCP/IP Stack; Using the Network and Sharing Center; Using the Network Map; Working with the Windows Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Microsoft Vista: Wireless World; Introduction; What's New with Wireless in Vista?; Wireless Security; Network Group Policy Enhancements; Configuring Wireless Security in Vista; Summary; Solutions Fast TrackFrequently Asked QuestionsChapter 8. Microsoft Vista: Windows Mail; Introduction; Comparing WindowsMail with Outlook Express; Phishing Filter; Junk Mail Filter; Instant Search; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Microsoft Vista: Update and Monitoring Services; Introduction; Using Windows Update; Using Windows Server Update Services (WSUS) and Vista; Using Systems Management Server and Vista; Using Microsoft Operations Manager and Vista; Using Third-Party Tools with Vista; Summary; Solutions Fast Track; Frequently Asked QuestionsChapter 10. Disaster Recovery with Exchange Server 2007Introduction; Backing Up Exchange 2007 Using Windows 2003 Backup; Restoring Exchange 2007 Storage Groups and Databases Using Windows 2003 Backup; Repairing a Corrupt or Damaged Exchange 2007 Database Using Eseutil; Recovering an Exchange 2007 Server Using the RecoverServer Switch; Recovering an Exchange 2007 Cluster Using the RecoverCMS Switch; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A. Microsoft Vista: The International Community; Microsoft vs. The World: What's the Issue?; Microsoft Vista: The EU FixesThe 2004 RulingThis book is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. The book begins with a discussion of Microsoft's Trustworthy Computing Initiative and Vista's development cycle, which was like none other in Microsoft's history. Expert authors will separate the hype from the reality of VisComputer securityElectronic books.Computer security.005.446005.8Piltzecker Tony1975-739042Chaffin Larry627559MiAaPQMiAaPQMiAaPQBOOK9910458831603321Microsoft Vista for IT security professionals2481147UNINA