Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Napier
cerebro
Nido
Vici
Grymma
Griechin
Blendshape
Fiechter
Stressful
Verwirrte
Hepatologie
Sultry
Vidi
CHARLES
Umweltschutz
quartetti
Yuggoth
Alkid
Vicksburg
Seventies
Thrashing
Resemblance
PATTERSON
Daphne
Tabs
trop
advantage
Shamati
Nanooptics
Paragone
bronco
Demos
elderly
BoneMan
toute
dispersion
GUNS
Throwback
Toolset
Cady
Renovations
Demingongo
Fogli
3068
Marradi
Lobes
Krtek
Berghella
Thorstein
Masamba
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Useful Links
Security/Hacking Windows Vista Security. Praxisorientierte Sicherheit für Profis
Posted on 2010-03-16
|
More Marcus Nasarek, "Windows Vista Security. Praxisorientierte Sicherheit für Profis" Wann immer über das neue Betriebssystem von Microsoft berichtet wird - Windows Vista und Sicherheit werden grundsätzlich in einem Atemzug genannt. Die wichtigsten Neuerungen in Vista betreffen den Bereich Sicherheit, gegenüber XP wurden die Sicherheitsfeatures deutlich erweitert. Als Systemadministrator oder IT-Architekt ist Ihre Zeit knapp bemessen: Dieses Buch bietet Ihnen einen schnellen Überblick und konkrete Anleitungen, um allen Sicherheitsanforderungen mit Vista gerecht zu werden. Leitfaden für die sichere Konfiguration des Vista-Clients: Vorgestellt werden alle neuen Sicherheitsfunktionen von Vista, die vor allem die Härtung des Systems, die Verwaltung von Zugriffsrechten und die Kommunikations- und Datensicherheit betreffen. Marcus Nasarek entwickelt in diesem Buch ein umfassendes Sicherheitskonzept für Vista, indem er die Sicherheitsmaßnahmen zum Schutz des lokalen Systems, der Netzwerkanbindung sowie die Sicherung elektronischer Daten erläutert. Unter anderem werden folgende Themen behandelt: * Kontrolle von Hardwareerweiterungen, Systemhärtung, digitale Zertifikate, Ereignisüberwachung * Schutz vor Malware, Windows Defender, Einschränkung von Zugriffsrechten, sichere Kennwörter * Sichere Netzwerkanbindung, WLAN und Bluetooth, Windows-Firewall, geschützte Fernzugriffe auf Unternehmensnetzwerke, Remote Access Service * Konfiguration von Internet Explorer und Windows Mail * Schützenswerte Daten, sichere Datenspeicherung, Datenverschlüsselung Fokus auf die Praxis: Als ausgewiesener Sicherheitsexperte verfolgt Marcus Nasarek einen pragmatischen Ansatz: Er stellt Sicherheitskonzepte vor, die lösungsorientiert, einfach umzusetzen und gleichzeitig wirtschaftlich sind. Konkrete Anwendungsfälle, Schritt-für-Schritt-Anleitungen, zahlreiche Checklisten und klare Empfehlungen des Experten runden den praxisbezogenen Charakter des Buchs ab. Thanks to the original uploader! Part 1 Part 2
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link (Depositfiles) | Alive |
Download Link (Mirror 1) | Alive |
Download Link (Mirror 2) | Alive |
Download Link (Depositfiles) | Alive |
Download Link (Mirror 1) | Alive |
Download Link (Mirror 2) | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: