Cover image for Windows NT security guide
Windows NT security guide
Miller, Stewart S.
Personal Author:
Publication Information:
Boston : Digital Press, [1998]

Physical Description:
xii, 322 pages : illustrations ; 24 cm
General Note:
Includes index.
Title Subject:
Format :


Call Number
Material Type
Home Location
Item Holds
QA76.76.O63 M5626 1998 Adult Non-Fiction Central Closed Stacks

On Order



Windows NT is fast becoming the platform of choice for the majority of business applications in the IT industry today. While this platform has offered several significant enhancements in terms of providing a flexible GUI, the main benefit is functionality and control over the computing environment. One of the biggest gaps in computer security has originated with the operating system. For example, hackers have been able to penetrate the Unix operating system and compromise the integrity of the data because it was not designed with security in mind. Windows NT 5.0, however, has been built on a more secure foundation from conception to delivery in an effort to provide security. This text identifies specific ways to implement Windows NT effectively and securely throughout an organization, including mobile locations, and shows how to prepare and protect against information attacks. Protecting your corporate data is crucial to the success of your organization. Windows NT can offer you a secure operating environment, but only if you guard points of entry where a hacker could compromise your data integrity. Knowing how to provide security can literally ensure your business's future. Focuses on practical, hands-on implementation Covers NT 5.0, as well as NT 4.0 Provides help at every stage from installation to network deployment and beyond

Table of Contents

Prefacep. vii
Introductionp. ix
1 Windows NT Security Issuesp. 1
2 Windows NT Security Modelp. 15
3 Planning a Secure Installationp. 41
4 Developing a Secure Network Cabling Systemp. 51
5 Selecting a Secure Media Access Methodp. 59
6 Securing the NT Registryp. 79
7 Windows NT File System Componentsp. 95
8 Securing Business Objectivesp. 111
9 Building a More Secure Desktopp. 119
10 Secure Network Deploymentp. 135
11 Windows NT Network Securityp. 145
12 Windows NT as a Secure Remote Access Serverp. 155
13 Windows NT "Secure" Serverp. 175
14 Securely Connecting to the Worldp. 191
15 Maintaining Securityp. 215
16 Web Securityp. 231
17 Windows NT Security Troublesp. 247
18 Cooperative Securityp. 263
19 Making Windows NT More Securep. 281
20 Avoiding NT Security Breachesp. 299
Indexp. 315