Microsoft Windows NT 4.0 Security Technical Reference: Guidelines for Security, Audit and Control by James G. Jumes, Neil F. Cooper, Paula Chamoun, Todd M. Feinman


  • Applicable additional discounts will be displayed at checkout.
  • This item is currently out of stock.


Average Customer Rating:

( customer rating )

  • Pub. Date: November 1998
  • 400pp
    • Overview
    • Editorial Reviews
    • Features

    Product Details

    • Pub. Date: November 1998
    • Publisher:Microsoft Press
    • Format: Paperback, 400pp


    "The Microsoft Windows NT 4.0 Security" offers the MIS professional, network architect, administrator, or webmaster a set of guidelines for securing, auditing, and controlling networks running on Windows NT 4.0. A computer security plan that is well thought out, implemented, and monitored makes authorized use of network computers easy and unauthorized use or accidental damage difficult if not impossible. Issues are introduced and explained conceptually, then the reader is walked through tested procedures for establishing a secure installation. Includes 120-day evaluation copy Microsoft Internet Information Server on CD

    Bill Camarda

    Few NT books do a credible job covering real-world security -- and if you're trying to deploy serious IT applications with Microsoft technologies, that's a big problem. Now, a team of Pricewaterhousecoopers Windows NT Server consultants have taken on the job, and from Page 1 you can see they know their stuff. MICROSOFT WINDOWS NT 4.0 SECURITY, AUDIT, AND CONTROL brings true data center discipline to securing NT systems and applications.

    You'll learn how to evaluate what's worth securing; and how to make the most of the tools Microsoft gives you. Exactly which alert settings to use in Performance Monitor. How to filter the colossal amounts of data Network Monitor gathers, so you can actually identify possible security breaches. Using NT's audit tools (many sysadmins don't bother, because of the performance hit, but this book makes sensible recommendations about which settings offer the most bang for the buck).

    The authors' expertise shows in even small details. Like including a legal notice on your logon dialog box warning that only authorized users may enter. (Did you know that some companies couldn't prosecute hackers because, instead of including a legal notice, they displayed a welcome banner?)

    An incredibly valuable appendix contains a detailed matrix of baseline security settings for every virtually element of an NT system, from accounts and user properties, to file permissions and registry settings. There are separate sets of settings for domain controllers, file/print servers, database servers, web servers, RAS servers, and workstations. Start your customization from the settings in this appendix, and you can dramatically upgrade your network's security without having to learn every tiny piece of NT minutiae. For NT managers and admins, this book is as "must-have" as they come.

    More Reviews and Recommendations

    Customer Reviews

    • Customer Rating:
    Be the first to write a review!