Search Results

Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist

Download or Read eBook Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist PDF written by Karen Scarfone and published by DIANE Publishing. This book was released on 2009-08 with total page 127 pages. Available in PDF, EPUB and Kindle.
Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
Author :
Publisher : DIANE Publishing
Total Pages : 127
Release :
ISBN-10 : 9781437914924
ISBN-13 : 1437914926
Rating : 4/5 (24 Downloads)

Book Synopsis Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist by : Karen Scarfone

Book excerpt: When an IT security configuration checklist (e.g., hardening or lockdown guide) is applied to a system in combination with trained system administrators and a sound and effective security program, a substantial reduction in vulnerability exposure can be achieved. This guide will assist personnel responsible for the administration and security of Windows XP systems. It contains information that can be used to secure local Windows XP workstations, mobile computers, and telecommuter systems more effectively in a variety of environments, including small office, home office and managed enterprise environments. The guidance should only be applied throughout an enterprise by trained and experienced system administrators. Illustrations.


Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist Related Books

Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
Language: en
Pages: 127
Authors: Karen Scarfone
Categories: Computers
Type: BOOK - Published: 2009-08 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

When an IT security configuration checklist (e.g., hardening or lockdown guide) is applied to a system in combination with trained system administrators and a s
Information Security
Language: en
Pages: 80
Authors: Gregory C. Wilshusen (au)
Categories: Computers
Type: BOOK - Published: 2005-11 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

Fed. agencies are facing a set of cybersecurity threats that are the result of increasingly sophisticated methods of attack & the blending of once distinct type
Trade Secret Theft, Industrial Espionage, and the China Threat
Language: en
Pages: 320
Authors: Carl Roper
Categories: Business & Economics
Type: BOOK - Published: 2013-12-10 - Publisher: CRC Press

DOWNLOAD EBOOK

This book provides an overview of economic espionage as practiced by a range of nations from around the world focusing on the mass scale in which information is
Guide to Computer Security Log Management
Language: en
Pages: 72
Authors: Karen Kent
Categories:
Type: BOOK - Published: 2007-08-01 - Publisher:

DOWNLOAD EBOOK

A log is a record of the events occurring within an org¿s. systems & networks. Many logs within an org. contain records related to computer security (CS). Thes
Information Security Risk Analysis
Language: en
Pages: 361
Authors: Thomas R. Peltier
Categories: Business & Economics
Type: BOOK - Published: 2005-04-26 - Publisher: CRC Press

DOWNLOAD EBOOK

The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets
Scroll to top