- Paperback: 216 pages
- Publisher: Syngress; 1 edition (October 7, 2010)
- Language: English
- ISBN-10: 1597495948
- ISBN-13: 978-1597495943
- Product Dimensions: 7.5 x 0.5 x 9.2 inches
- Shipping Weight: 1 pounds (View shipping rates and policies)
- Average Customer Review: 14 customer reviews
- Amazon Best Sellers Rank: #2,902,496 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
See the Best Books of 2018 So Far
Looking for something great to read? Browse our editors' picks for the best books of the year so far in fiction, nonfiction, mysteries, children's books, and much more.
Frequently bought together
Customers who bought this item also bought
"This handy guide features security information for Windows novices and more experienced admins alike, including security basics and tools that provide advanced protection against network attacks and system failures."--TechTarget’s round-up of the "Five Windows Servers books to watch for in 2011"
"Anyone faced with securing Windows systems for the first time would do well to make this book their first port of call. It’s a well-balanced overview of all the facets of Windows system management that need to be addressed from a security perspective. In fact, it’s a useful book for anyone, working on any platform, who needs to understand where security issues reside within corporate systems. That’s because, although it is focused on Windows, and all the practical examples, screenshots and step-by-step instructions relate to that platform, the author also devotes considerable portions of the book to the conceptual groundwork…. IT practitioners who need to get to grips with security issues will find the book a valuable briefing on the most pressing issues, along with a great deal of practical, hands-on advice on how you go about putting the principles into action in a Windows environment…. this book gives you a kind of ‘to do’ list of features and functions that need to be addressed."--Network Security
About the Author
Derrick Rountree (CISSP, CASP, MCSE) has been in the IT field for almost 20 years. He has a Bachelors of Science in Electrical Engineering. Derrick has held positions as a network administrator, IT consultant, a QA engineer, and an Enterprise Architect. He has experience in network security, operating system security, application security, and secure software development. Derrick has contributed to several other Syngress and Elsevier publications on Citrix, Microsoft, and Cisco technologies.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Another issue is that this book is not up to date with the latest and greatest. The focus is very much on older technologies and threats, and not the newer ones. If I didn't know better, I would have guessed that this book was written about 4 years ago. For example, when discussing networking it still references class A, B, and C addresses as being assigned to certain ranges. The truth is this hasn't been done since CIDR took over years ago. When covering viruses the authors mention logic bombs (sooooo 1995) and macro viruses (soooo 2001), but don't mention the newer threats like man-in-the-browser, customized malware, and credential stealing malware. When it covers remote admin protocols it mentions telnet and SSH but not VNC and WMI. I know far more windows admins who use the latter than the former.
The book does a great job explaining a whole lot of IT security related technologies in an easily understandable manner. It really is aimed at the beginner, and as such it doesn't cover a lot of the cutting edge things. It consists largely of definitions and explanations, and as such is probably not a bad reference book for a Windows sys admin who wants to know the language of information security.
is not discussed, but the principles of security, compliance, and authentication is great in theory, but when the
authentication ideas are so weak in the current state of cyber breaches, a summary needs to maybe mention the
weaknesses. Still, it works fine in theory.The structure in the book covers Cryptography( giving a list of various
algorithms, and encryption methods, but not saying that given time, some of these are eminently hackable), Network
Security( it covers the OSI model, essential for understanding the details of some attacks ), System Security. The
section on Organizational and operational security relates to physical protection of the server, and the related
policy elements are fairly good, but omit some of the virtual element weaknesses.
Finally the section titled asessments and audits are listed; these are basic in form, but omit that they should be audits remote from the servers, and cover pentesting ( penetration testing ) at least in a basic way. The best mention is that this security summary does cover some elements of the forensics required if some access has been improperly gained. But, this is an introduction and that is better than none.In System Security, the book has a very good summary of basic software and hardware devices that amount to "threats"; The odd thing is that other sections like cryptography have no summary of similar weaknesses. The certificates in almost all areas including cryptography are so very susceptible, that the one thing that a security specialist needs to be is constantly aware and constantly updating their knowledge.The certificates are dangerous in the extreme, especially when incorrectly blocked, or not blocked at all ( it will allow for data mining ) But, to re-state, the gaining of knowledge starts with one step as some say, there has to be a beginning.
To quote a recent report: we most go beyond Discover first and innoculate Second, since this is no longer
enough. Whilst this book is a good place to start, you have to think better than the hackers, because you can be
sure they will out-think you at some stage. Side Channel Attacks in a Virtual setup will be a problem for example.
Most recent customer reviews
CISSP All-in-One Exam Guide, 6th Edition