LEADER 05371nam 2200661 a 450 001 9910826068003321 005 20230120004938.0 010 $a1-281-11264-X 010 $a9786611112646 010 $a0-08-055614-0 035 $a(CKB)1000000000383558 035 $a(EBL)328623 035 $a(OCoLC)476126396 035 $a(SSID)ssj0000202588 035 $a(PQKBManifestationID)11200562 035 $a(PQKBTitleCode)TC0000202588 035 $a(PQKBWorkID)10255156 035 $a(PQKB)11282898 035 $a(Au-PeEL)EBL328623 035 $a(CaPaEBR)ebr10204359 035 $a(CaONFJC)MIL111264 035 $a(CaSebORM)9781597491396 035 $a(MiAaPQ)EBC328623 035 $a(EXLCZ)991000000000383558 100 $a20070420d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aMicrosoft Vista for IT security professionals /$fAnthony Piltzecker, technical editor ; Larry Chaffin ... [et al.] 205 $a1st edition 210 $aRockland, Mass. $cSyngress Publishing$dc2007 215 $a1 online resource (673 p.) 300 $aDescription based upon print version of record. 311 $a1-59749-139-X 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Vista for IT Security Professionals; Copyright Page; Contents; Foreword; About the CD; Chapter 1. Microsoft Vista: An Overview; Introduction; The User Interface; Internet Explorer 7; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Microsoft Vista: The Battle Against Malware Lives On; Introduction; Malware Fundamentals; Improvements in Internet Explorer 7; Windows Security Center; Windows Defender; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Microsoft Vista: Securing User Access; Introduction; Access Control Fundamentals 327 $aImproving the Logon ArchitectureUser Account Control; Remote Assistance; Network Access Protection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Microsoft Vista: Trusted Platform Module Services; Introduction; Understanding the TPM; Configuring and Managing the TPM on a Stand-Alone System; Configuring and Managing the TPM in an Enterprise Environment; TPM Applications; Understanding the Security Implications of the TPM; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Microsoft Vista: Data Protection; Introduction; USB Devices; Rights Management 327 $aEncrypting File SystemWhole-Disk Encryption; PatchGuard; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Microsoft Vista: Networking Essentials; Introduction; Not Your Father's TCP/IP Stack; Using the Network and Sharing Center; Using the Network Map; Working with the Windows Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Microsoft Vista: Wireless World; Introduction; What's New with Wireless in Vista?; Wireless Security; Network Group Policy Enhancements; Configuring Wireless Security in Vista; Summary; Solutions Fast Track 327 $aFrequently Asked QuestionsChapter 8. Microsoft Vista: Windows Mail; Introduction; Comparing WindowsMail with Outlook Express; Phishing Filter; Junk Mail Filter; Instant Search; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Microsoft Vista: Update and Monitoring Services; Introduction; Using Windows Update; Using Windows Server Update Services (WSUS) and Vista; Using Systems Management Server and Vista; Using Microsoft Operations Manager and Vista; Using Third-Party Tools with Vista; Summary; Solutions Fast Track; Frequently Asked Questions 327 $aChapter 10. Disaster Recovery with Exchange Server 2007Introduction; Backing Up Exchange 2007 Using Windows 2003 Backup; Restoring Exchange 2007 Storage Groups and Databases Using Windows 2003 Backup; Repairing a Corrupt or Damaged Exchange 2007 Database Using Eseutil; Recovering an Exchange 2007 Server Using the RecoverServer Switch; Recovering an Exchange 2007 Cluster Using the RecoverCMS Switch; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A. Microsoft Vista: The International Community; Microsoft vs. The World: What's the Issue?; Microsoft Vista: The EU Fixes 327 $aThe 2004 Ruling 330 $aThis book is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. The book begins with a discussion of Microsoft's Trustworthy Computing Initiative and Vista's development cycle, which was like none other in Microsoft's history. Expert authors will separate the hype from the reality of Vis 606 $aComputer security 615 0$aComputer security. 676 $a005.446 676 $a005.8 676 $a005.8 701 $aPiltzecker$b Tony$f1975-$0739042 701 $aChaffin$b Larry$0627559 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910826068003321 996 $aMicrosoft Vista for IT security professionals$93956103 997 $aUNINA