Combating spyware in the enterprise [[electronic resource] /] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, 2006 |
Descrizione fisica | 1 online resource (411 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
BaskinBrian
PiltzeckerTony <1975-> |
Soggetto topico |
Computer security
Spyware (Computer software) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-07831-X
9786611078317 0-08-050222-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan Encapsulation
Spyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and Removal IntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked Questions Appendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Record Nr. | UNINA-9910450889203321 |
Rockland, MA, : Syngress, 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Combating spyware in the enterprise [[electronic resource] /] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, 2006 |
Descrizione fisica | 1 online resource (411 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
BaskinBrian
PiltzeckerTony <1975-> |
Soggetto topico |
Computer security
Spyware (Computer software) |
ISBN |
1-281-07831-X
9786611078317 0-08-050222-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan Encapsulation
Spyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and Removal IntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked Questions Appendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Record Nr. | UNINA-9910784271303321 |
Rockland, MA, : Syngress, 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Combating spyware in the enterprise / / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, 2006 |
Descrizione fisica | 1 online resource (411 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
BaskinBrian
PiltzeckerTony <1975-> |
Soggetto topico |
Computer security
Spyware (Computer software) |
ISBN |
1-281-07831-X
9786611078317 0-08-050222-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Combating Spyware in the Enterprise; Copyright Page; Contents; Chapter 1. An Overview of Spyware; Introduction; Spyware: Defined; Malware: Defined; Adware: Defined; Parasiteware: Defined; Phishing: Defined; Botnets: Defined; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Transformation of Spyware; Introduction; The Humble Beginnings; Spyware in the Twenty-First Century; The Future of Spyware; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Spyware and the Enterprise Network; Introduction; Keystroke Loggers; Trojan Encapsulation
Spyware and BackdoorsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Real Spyware-Crime, Economic Espionage, and Espionage; Introduction; White to Gray to Black- Increasing Criminal Use of Spyware; It's All in the Delivery; Phishing Detection; Reporting Phishing; Bot Detection; Reporting Botnets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Solutions for the End User; Introduction; Freeware Solutions; Toolbar Solutions; Licensed Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Forensic Detection and Removal IntroductionManual Detection Techniques; Detection and Removal Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Frugal Engineer's Guide to Spyware Prevention; Introduction; Locking Down Internet Explorer; Developing a Security Update Strategy; Securing E-mail; Securing Windows; Summary; Solutions Fast Track; Frequently Asked Questions Appendix A: Malware, Money Movers, and Ma Bell Mayhem!Introduction; Mule Driving and Money Laundering; Phishers Phone Home; Slithering Scalability; The Phuture of Phishing; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Altri titoli varianti | Spyware in the enterprise |
Record Nr. | UNINA-9910823667603321 |
Rockland, MA, : Syngress, 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
MCSE implementing and administering security in a Windows 2000 network study guide & DVD training system [[electronic resource] /] / Will Schmied, Robert J. Shimonski |
Autore | Schmied Will |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, c2003 |
Descrizione fisica | 1 online resource (865 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
SchinderThomas W
PiltzeckerTony <1975-> |
Soggetto topico |
Electronic data processing personnel - Certification
Microsoft software - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05612-X
9786611056124 0-08-047931-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; MCSE/MCSA 70-214 Exam Objectives Map; Table of Contents; Chapter 1 Basic Windows 2000 Security: Using Security Templates; Chapter 2 Advanced Security Template and Group Policy Issues; Chapter 3 Identifying, Installing, and Troubleshooting Required Updates; Chapter 4 Installing, Configuring, & Managing Windows 2000 Certificate Authorities; Chapter 5 Managing and Troubleshooting the Encrypting File System; Chapter 6 Configuring and Troubleshooting Windows IP Security; Chapter 7 Implementing Secure Wireless Networks; Chapter 8 Configuring Secure Network and Internet Authentication Methods
Chapter 9 Configuring and Troubleshooting Remote Access and VPN AuthenticationChapter 10 Configuring and Using Auditing and the Event Logs; Appendix A Utilities for the White Hat; Appendix B Port Numbers and Associated Attacks; Appendix C Self Test Questions, Answers, and Explanations; Index |
Record Nr. | UNINA-9910456345903321 |
Schmied Will
![]() |
||
Rockland, Mass., : Syngress, c2003 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
MCSE implementing and administering security in a Windows 2000 network study guide & DVD training system [[electronic resource] /] / Will Schmied, Robert J. Shimonski |
Autore | Schmied Will |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, c2003 |
Descrizione fisica | 1 online resource (865 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
SchinderThomas W
PiltzeckerTony <1975-> |
Soggetto topico |
Electronic data processing personnel - Certification
Microsoft software - Examinations |
ISBN |
1-281-05612-X
9786611056124 0-08-047931-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; MCSE/MCSA 70-214 Exam Objectives Map; Table of Contents; Chapter 1 Basic Windows 2000 Security: Using Security Templates; Chapter 2 Advanced Security Template and Group Policy Issues; Chapter 3 Identifying, Installing, and Troubleshooting Required Updates; Chapter 4 Installing, Configuring, & Managing Windows 2000 Certificate Authorities; Chapter 5 Managing and Troubleshooting the Encrypting File System; Chapter 6 Configuring and Troubleshooting Windows IP Security; Chapter 7 Implementing Secure Wireless Networks; Chapter 8 Configuring Secure Network and Internet Authentication Methods
Chapter 9 Configuring and Troubleshooting Remote Access and VPN AuthenticationChapter 10 Configuring and Using Auditing and the Event Logs; Appendix A Utilities for the White Hat; Appendix B Port Numbers and Associated Attacks; Appendix C Self Test Questions, Answers, and Explanations; Index |
Record Nr. | UNINA-9910780121903321 |
Schmied Will
![]() |
||
Rockland, Mass., : Syngress, c2003 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
MCSE implementing and administering security in a Windows 2000 network study guide & DVD training system / / Will Schmied, Robert J. Shimonski |
Autore | Schmied Will |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, c2003 |
Descrizione fisica | 1 online resource (865 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
SchinderThomas W
PiltzeckerTony <1975-> |
Soggetto topico |
Electronic data processing personnel - Certification
Microsoft software - Examinations |
ISBN |
1-281-05612-X
9786611056124 0-08-047931-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; MCSE/MCSA 70-214 Exam Objectives Map; Table of Contents; Chapter 1 Basic Windows 2000 Security: Using Security Templates; Chapter 2 Advanced Security Template and Group Policy Issues; Chapter 3 Identifying, Installing, and Troubleshooting Required Updates; Chapter 4 Installing, Configuring, & Managing Windows 2000 Certificate Authorities; Chapter 5 Managing and Troubleshooting the Encrypting File System; Chapter 6 Configuring and Troubleshooting Windows IP Security; Chapter 7 Implementing Secure Wireless Networks; Chapter 8 Configuring Secure Network and Internet Authentication Methods
Chapter 9 Configuring and Troubleshooting Remote Access and VPN AuthenticationChapter 10 Configuring and Using Auditing and the Event Logs; Appendix A Utilities for the White Hat; Appendix B Port Numbers and Associated Attacks; Appendix C Self Test Questions, Answers, and Explanations; Index |
Record Nr. | UNINA-9910823342703321 |
Schmied Will
![]() |
||
Rockland, Mass., : Syngress, c2003 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Vista for IT security professionals [[electronic resource] /] / Anthony Piltzecker, technical editor ; Larry Chaffin ... [et al.] |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress Publishing, c2007 |
Descrizione fisica | 1 online resource (673 p.) |
Disciplina |
005.446
005.8 |
Altri autori (Persone) |
PiltzeckerTony <1975->
ChaffinLarry |
Soggetto topico | Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-11264-X
9786611112646 0-08-055614-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Vista for IT Security Professionals; Copyright Page; Contents; Foreword; About the CD; Chapter 1. Microsoft Vista: An Overview; Introduction; The User Interface; Internet Explorer 7; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Microsoft Vista: The Battle Against Malware Lives On; Introduction; Malware Fundamentals; Improvements in Internet Explorer 7; Windows Security Center; Windows Defender; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Microsoft Vista: Securing User Access; Introduction; Access Control Fundamentals
Improving the Logon ArchitectureUser Account Control; Remote Assistance; Network Access Protection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Microsoft Vista: Trusted Platform Module Services; Introduction; Understanding the TPM; Configuring and Managing the TPM on a Stand-Alone System; Configuring and Managing the TPM in an Enterprise Environment; TPM Applications; Understanding the Security Implications of the TPM; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Microsoft Vista: Data Protection; Introduction; USB Devices; Rights Management Encrypting File SystemWhole-Disk Encryption; PatchGuard; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Microsoft Vista: Networking Essentials; Introduction; Not Your Father's TCP/IP Stack; Using the Network and Sharing Center; Using the Network Map; Working with the Windows Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Microsoft Vista: Wireless World; Introduction; What's New with Wireless in Vista?; Wireless Security; Network Group Policy Enhancements; Configuring Wireless Security in Vista; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 8. Microsoft Vista: Windows Mail; Introduction; Comparing WindowsMail with Outlook Express; Phishing Filter; Junk Mail Filter; Instant Search; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Microsoft Vista: Update and Monitoring Services; Introduction; Using Windows Update; Using Windows Server Update Services (WSUS) and Vista; Using Systems Management Server and Vista; Using Microsoft Operations Manager and Vista; Using Third-Party Tools with Vista; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 10. Disaster Recovery with Exchange Server 2007Introduction; Backing Up Exchange 2007 Using Windows 2003 Backup; Restoring Exchange 2007 Storage Groups and Databases Using Windows 2003 Backup; Repairing a Corrupt or Damaged Exchange 2007 Database Using Eseutil; Recovering an Exchange 2007 Server Using the RecoverServer Switch; Recovering an Exchange 2007 Cluster Using the RecoverCMS Switch; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A. Microsoft Vista: The International Community; Microsoft vs. The World: What's the Issue?; Microsoft Vista: The EU Fixes The 2004 Ruling |
Record Nr. | UNINA-9910458831603321 |
Rockland, Mass., : Syngress Publishing, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Vista for IT security professionals [[electronic resource] /] / Anthony Piltzecker, technical editor ; Larry Chaffin ... [et al.] |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress Publishing, c2007 |
Descrizione fisica | 1 online resource (673 p.) |
Disciplina |
005.446
005.8 |
Altri autori (Persone) |
PiltzeckerTony <1975->
ChaffinLarry |
Soggetto topico | Computer security |
ISBN |
1-281-11264-X
9786611112646 0-08-055614-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Vista for IT Security Professionals; Copyright Page; Contents; Foreword; About the CD; Chapter 1. Microsoft Vista: An Overview; Introduction; The User Interface; Internet Explorer 7; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Microsoft Vista: The Battle Against Malware Lives On; Introduction; Malware Fundamentals; Improvements in Internet Explorer 7; Windows Security Center; Windows Defender; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Microsoft Vista: Securing User Access; Introduction; Access Control Fundamentals
Improving the Logon ArchitectureUser Account Control; Remote Assistance; Network Access Protection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Microsoft Vista: Trusted Platform Module Services; Introduction; Understanding the TPM; Configuring and Managing the TPM on a Stand-Alone System; Configuring and Managing the TPM in an Enterprise Environment; TPM Applications; Understanding the Security Implications of the TPM; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Microsoft Vista: Data Protection; Introduction; USB Devices; Rights Management Encrypting File SystemWhole-Disk Encryption; PatchGuard; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Microsoft Vista: Networking Essentials; Introduction; Not Your Father's TCP/IP Stack; Using the Network and Sharing Center; Using the Network Map; Working with the Windows Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Microsoft Vista: Wireless World; Introduction; What's New with Wireless in Vista?; Wireless Security; Network Group Policy Enhancements; Configuring Wireless Security in Vista; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 8. Microsoft Vista: Windows Mail; Introduction; Comparing WindowsMail with Outlook Express; Phishing Filter; Junk Mail Filter; Instant Search; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Microsoft Vista: Update and Monitoring Services; Introduction; Using Windows Update; Using Windows Server Update Services (WSUS) and Vista; Using Systems Management Server and Vista; Using Microsoft Operations Manager and Vista; Using Third-Party Tools with Vista; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 10. Disaster Recovery with Exchange Server 2007Introduction; Backing Up Exchange 2007 Using Windows 2003 Backup; Restoring Exchange 2007 Storage Groups and Databases Using Windows 2003 Backup; Repairing a Corrupt or Damaged Exchange 2007 Database Using Eseutil; Recovering an Exchange 2007 Server Using the RecoverServer Switch; Recovering an Exchange 2007 Cluster Using the RecoverCMS Switch; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A. Microsoft Vista: The International Community; Microsoft vs. The World: What's the Issue?; Microsoft Vista: The EU Fixes The 2004 Ruling |
Record Nr. | UNINA-9910784617003321 |
Rockland, Mass., : Syngress Publishing, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Vista for IT security professionals / / Anthony Piltzecker, technical editor ; Larry Chaffin ... [et al.] |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress Publishing, c2007 |
Descrizione fisica | 1 online resource (673 p.) |
Disciplina |
005.446
005.8 |
Altri autori (Persone) |
PiltzeckerTony <1975->
ChaffinLarry |
Soggetto topico | Computer security |
ISBN |
1-281-11264-X
9786611112646 0-08-055614-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Vista for IT Security Professionals; Copyright Page; Contents; Foreword; About the CD; Chapter 1. Microsoft Vista: An Overview; Introduction; The User Interface; Internet Explorer 7; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Microsoft Vista: The Battle Against Malware Lives On; Introduction; Malware Fundamentals; Improvements in Internet Explorer 7; Windows Security Center; Windows Defender; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Microsoft Vista: Securing User Access; Introduction; Access Control Fundamentals
Improving the Logon ArchitectureUser Account Control; Remote Assistance; Network Access Protection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Microsoft Vista: Trusted Platform Module Services; Introduction; Understanding the TPM; Configuring and Managing the TPM on a Stand-Alone System; Configuring and Managing the TPM in an Enterprise Environment; TPM Applications; Understanding the Security Implications of the TPM; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Microsoft Vista: Data Protection; Introduction; USB Devices; Rights Management Encrypting File SystemWhole-Disk Encryption; PatchGuard; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Microsoft Vista: Networking Essentials; Introduction; Not Your Father's TCP/IP Stack; Using the Network and Sharing Center; Using the Network Map; Working with the Windows Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Microsoft Vista: Wireless World; Introduction; What's New with Wireless in Vista?; Wireless Security; Network Group Policy Enhancements; Configuring Wireless Security in Vista; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 8. Microsoft Vista: Windows Mail; Introduction; Comparing WindowsMail with Outlook Express; Phishing Filter; Junk Mail Filter; Instant Search; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Microsoft Vista: Update and Monitoring Services; Introduction; Using Windows Update; Using Windows Server Update Services (WSUS) and Vista; Using Systems Management Server and Vista; Using Microsoft Operations Manager and Vista; Using Third-Party Tools with Vista; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 10. Disaster Recovery with Exchange Server 2007Introduction; Backing Up Exchange 2007 Using Windows 2003 Backup; Restoring Exchange 2007 Storage Groups and Databases Using Windows 2003 Backup; Repairing a Corrupt or Damaged Exchange 2007 Database Using Eseutil; Recovering an Exchange 2007 Server Using the RecoverServer Switch; Recovering an Exchange 2007 Cluster Using the RecoverCMS Switch; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A. Microsoft Vista: The International Community; Microsoft vs. The World: What's the Issue?; Microsoft Vista: The EU Fixes The 2004 Ruling |
Record Nr. | UNINA-9910826068003321 |
Rockland, Mass., : Syngress Publishing, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security+ study guide and DVD training system [[electronic resource] /] / Michael Cross, Norris L. Johnson, Jr., Tony Piltzecker |
Autore | Cross Michael |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2002 |
Descrizione fisica | 1 online resource (866 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
JohnsonNorris L
PiltzeckerTony <1975-> ShimonskiRobert ShinderDebra Littlejohn |
Soggetto topico |
Computer networks - Security measures - Examinations
Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05608-1
9786611056087 0-08-048081-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Table of Contents; Foreword; Access Control, Authentication, and Auditing; Attacks; Remote Access and E-mail; Wireless; Web Security; Devices and Media; Topologies and IDS; System Hardening; Basics of Cryptography; Public Key Infrastructure; Incident Response; Policies and Disaster Recovery; Appendix; Index; Related Titles |
Altri titoli varianti | Security plus study guide and DVD training system |
Record Nr. | UNINA-9910455684203321 |
Cross Michael
![]() |
||
Rockland, Mass., : Syngress, 2002 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|