Item type | Current library | Home library | Shelving location | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | American University in Dubai | American University in Dubai | Main Collection | QA 76.9 .A25 .K49 2002 (Browse shelf(Opens below)) | Available | 651315 |
QA 76.9 .A25 G743 2011 Gray hat hacking : the ethical hacker's handbook / | QA 76.9 .A25 H83 2003 Hacking the Xbox : an introduction to reverse engineering / | QA 76.9 .A25 I33 2008 Information theoretic security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008 : proceedings / | QA 76.9 .A25 .K49 2002 MCSE guide to designing Microsoft Windows 2000 security / | QA 76.9 .A25 M428 2003 Hacking exposed : network security secrets & solutions / | QA 76.9 .A25 M428 2009 Hacking exposed 6 : network security secrets & solutions / | QA 76.9 .A25 M4865 2011 Metasploit : the penetration tester's guide / |
Use to prepare for MCSE Certification Exam #70-220.
Identifying Security Risks -- Internal Security Risks -- External Security Risks -- Managing Security Risks -- Corporate Components to Security Planning -- Identifying Business Models -- Identifying Corporate Strategies and Goals -- Identifying IT Administrative Structures -- Identifying the Current Technical Environment -- Identifying the Current Security Model -- Securing Resources on Windows 2000 Servers -- Implementing User Authentication -- Accessing Resources -- Securing File Resources -- Encrypting File System -- Securing Printers -- Securing The Registry -- Configuring an Audit Policy -- Planning Best Practices -- Designing Active Directory for Security -- Active Directory Components -- Securing Active Directory -- Managing Account Policies -- Delegating Administrative Tasks -- Implementing Security Groups -- Implementing Group Policies for Security -- Planning Best Practices -- Implementing a Public Key Infrastructure -- Public Key Infrastructure (PKI) Overview -- Planning and Implementing a Public Key Infrastructure -- Windows 2000 Certificate Server Implementation -- Mapping User Accounts to Certificates -- Certificate Server Client Implementation -- Integration with Third-Party CAs -- Planning Best Practices -- Securing Network Services -- Implementing DNS and DHCP Security -- Implementing Remote Installation Services Security -- Implementing Terminal Server Security -- Implementing SNMP Security -- Securing Servers Using Security Templates -- Implementing Secure Access for NonMicrosoft Clients -- Planning Best Practices -- Securing Network Communications -- Implementing Server Message Block Signing -- Securing Network Traffic Using IP Security -- Planning Best Practices -- Securing Access for Remote Access Users -- Implementing and Configuring Routing and Remote Access -- Securing Remote Access -- Remote Access Policies -- Internet Authentication Server -- Planning Best Practices -- Securing Access Between Corporate Locations -- Security Risks for Data Between Corporate Locations -- Configuring Windows 2000 as a Router -- Configuring and Securing Virtual Private Networks -- Configuring Secure Access to Partner Organizations -- Planning Best Practices -- Designing Secure Access to the Internet -- Securing the Internal Network from the Internet -- Securing User Access to the Internet -- Planning Best Practices -- Exam Objectives for MCSE Certification Exam #70-220: Designing Security for a Microsoft Windows 2000 Network -- Analyzing Business Requirements -- Analyzing Technical Requirements -- Analyzing Security Requirements -- Designing a Windows 2000 Security Solution -- Designing a Security Solution for Access Between Networks -- Designing Security for Communication Channels.
MCSE Guide to Designing Microsoft Windows 2000 Security is designed to prepare you for the challenges you will face as a networking professional responsible for designing Windows 2000 security solutions -- skills that are in high demand in today's business environment.
There are no comments on this title.