Description

Book Synopsis
Today's uber viruses, worms, and trojans may seem more damaging than ever, but the attacking malware and malicious hackers are using the same tricks they always have. With this book, Microsoft MVP Roger Grimes exposes the real threat to Windows computers and offers practical guidance to secure those systems.

Table of Contents
Acknowledgments.

Introduction.

Part I: The Basics in Depth.

Chapter 1: Windows Attacks.

Chapter 2: Conventional and Unconventional Defenses.

Chapter 3: NTFS Permissions 101.

Part II: OS Hardening.

Chapter 4: Preventing Password Crackers.

Chapter 5: Protecting High-Risk Files.

Chapter 6: Protecting High-Risk Registry Entries.

Chapter 7: Tightening Services.

Chapter 8: Using IPSec.

Part III: Application Security.

Chapter 9: Stopping Unauthorized Execution.

Chapter 10: Securing Internet Explorer.

Chapter 11: Protecting E-mail.

Chapter 12: IIS Security.

Chapter 13: Using Encrypting File System.

Part IV: Automating Security.

Chapter 14: Group Policy Explained.

Chapter 15: Designing a Secure Active Directory Infrastructure.

Book Summary.

Index.

Professional Windows Desktop and Server Hardening

Product form

£23.99

Includes FREE delivery

RRP £29.99 – you save £6.00 (20%)

Order before 4pm today for delivery by Tue 20 Jan 2026.

A Paperback / softback by Roger A. Grimes

15 in stock


    View other formats and editions of Professional Windows Desktop and Server Hardening by Roger A. Grimes

    Publisher: John Wiley & Sons Inc
    Publication Date: 12/05/2006
    ISBN13: 9780764599903, 978-0764599903
    ISBN10: 0764599909

    Description

    Book Synopsis
    Today's uber viruses, worms, and trojans may seem more damaging than ever, but the attacking malware and malicious hackers are using the same tricks they always have. With this book, Microsoft MVP Roger Grimes exposes the real threat to Windows computers and offers practical guidance to secure those systems.

    Table of Contents
    Acknowledgments.

    Introduction.

    Part I: The Basics in Depth.

    Chapter 1: Windows Attacks.

    Chapter 2: Conventional and Unconventional Defenses.

    Chapter 3: NTFS Permissions 101.

    Part II: OS Hardening.

    Chapter 4: Preventing Password Crackers.

    Chapter 5: Protecting High-Risk Files.

    Chapter 6: Protecting High-Risk Registry Entries.

    Chapter 7: Tightening Services.

    Chapter 8: Using IPSec.

    Part III: Application Security.

    Chapter 9: Stopping Unauthorized Execution.

    Chapter 10: Securing Internet Explorer.

    Chapter 11: Protecting E-mail.

    Chapter 12: IIS Security.

    Chapter 13: Using Encrypting File System.

    Part IV: Automating Security.

    Chapter 14: Group Policy Explained.

    Chapter 15: Designing a Secure Active Directory Infrastructure.

    Book Summary.

    Index.

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account