Guide to Securing Microsoft Windows XP Systems for IT Professionals A NIST Security Configuration Checklist

Guide to Securing Microsoft Windows XP Systems for IT Professionals  A NIST Security Configuration Checklist
Author : Karen Scarfone
Publisher : DIANE Publishing
Total Pages : 119
Release : 2009-08
ISBN 10 : 9781437914924
ISBN 13 : 1437914926
Language : EN, FR, DE, ES & NL

Guide to Securing Microsoft Windows XP Systems for IT Professionals A NIST Security Configuration Checklist Book Description:

When an IT security configuration checklist (e.g., hardening or lockdown guide) is applied to a system in combination with trained system administrators and a sound and effective security program, a substantial reduction in vulnerability exposure can be achieved. This guide will assist personnel responsible for the administration and security of Windows XP systems. It contains information that can be used to secure local Windows XP workstations, mobile computers, and telecommuter systems more effectively in a variety of environments, including small office, home office and managed enterprise environments. The guidance should only be applied throughout an enterprise by trained and experienced system administrators. Illustrations.


RELATED BOOKS:
Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
Language: en
Pages: 119
Authors: Karen Scarfone
Categories:
Type: BOOK - Published: 2009-08 - Publisher: DIANE Publishing

When an IT security configuration checklist (e.g., hardening or lockdown guide) is applied to a system in combination with trained system administrators and a sound and effective security program, a substantial reduction in vulnerability exposure can be achieved. This guide will assist personnel responsible for the administration and security of
Windows Xp Security Guide
Language: en
Pages: 106
Authors: Robert P. Millar
Categories: Computers
Type: BOOK - Published: 2011-09-01 - Publisher: CreateSpace

If your computer starts to run slower than it once did, it may be an indication that it has become infected with a virus or malware. Instead of spending fruitless hours trying to rid your system of an infection, it may be simpler and more effective to just reinstall the
Group Policy
Language: en
Pages: 1200
Authors: Jeremy Moskowitz
Categories: Computers
Type: BOOK - Published: 2010-05-13 - Publisher: John Wiley & Sons

Books about Group Policy
How to Cheat at Configuring Open Source Security Tools
Language: en
Pages: 528
Authors: Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty
Categories: Computers
Type: BOOK - Published: 2011-04-18 - Publisher: Elsevier

The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
Endpoint Security
Language: en
Pages: 384
Authors: Mark Kadrich
Categories: Computers
Type: BOOK - Published: 2007-03-30 - Publisher: Addison-Wesley Professional

A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and