10% Discount with Use Code SAVEON10
  • Cart
  • Contact us
  • FAQ
logo7 edebook
Login / Register
Wishlist
0 Compare
6 items $90.79
Menu
logo7 edebook
6 items $90.79
  • Home
  • Shop
  • My account
  • Blog
  • About us
  • Contact us
  • Request an eBook
“Software Engineering 10th GLOBAL Edition by Ian Sommerville, ISBN-13: 978-1292096131” has been added to your cart. View cart
Security Strategies in Windows Platforms and Applications 3rd Edition by Michael G. Solomon, ISBN-13: 978-1284175622
Home Computing Security Strategies in Windows Platforms and Applications 3rd Edition by Michael G. Solomon, ISBN-13: 978-1284175622
Social Media and Electronic Commerce Law 2nd Edition by Alan Davidson, ISBN-13: 978-1107500532
Social Media and Electronic Commerce Law 2nd Edition by Alan Davidson, ISBN-13: 978-1107500532 $50.00 Original price was: $50.00.$14.92Current price is: $14.92.
Back to products
Security in Fixed and Wireless Networks 2nd Edition, ISBN-13: 978-1119040743
Security in Fixed and Wireless Networks 2nd Edition, ISBN-13: 978-1119040743 $50.00 Original price was: $50.00.$17.88Current price is: $17.88.

Security Strategies in Windows Platforms and Applications 3rd Edition by Michael G. Solomon, ISBN-13: 978-1284175622

Rated 4.00 out of 5 based on 1 customer rating
(1 customer review)

$50.00 Original price was: $50.00.$14.96Current price is: $14.96.

Compare
Add to wishlist
SKU: security-strategies-in-windows-platforms-and-applications-3rd-edition-by-michael-g-solomon-isbn-13-978-1284175622 Category: Computing Tags: ISBN-10: 1284175626, ISBN-13: 978-1284175622, Michael G. Solomon, Security Strategies in Windows Platforms and Applications 3rd Edition by Michael G. Solomon
Share:
  • Description
  • Reviews (1)
  • Shipping & Delivery
Description

Security Strategies in Windows Platforms and Applications 3rd Edition by Michael G. Solomon, ISBN-13: 978-1284175622

[PDF eBook eTextbook]

  • Publisher: ‎ Jones & Bartlett Learning; 3rd edition (October 23, 2019)
  • Language: ‎ English
  • 374 pages
  • ISBN-10: ‎ 1284175626
  • ISBN-13: ‎ 978-1284175622

Revised and updated to keep pace with this ever changing field, Security Strategies in Windows Platforms and Applications, Third Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system, placing a particular emphasis on Windows 10, and Windows Server 2016 and 2019. The Third Edition highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security strategies and techniques.

Table of Contents:

Preface
Acknowledgments
About the Author
PART I The Microsoft Windows Security Situation
CHAPTER 1 Microsoft Windows and the Threat Landscape
Information Systems Security
Tenets of Information Security: The C-I-A Triad
Confidentiality
Integrity
Availability
Mapping Microsoft Windows and Applications into a Typical IT Infrastructure
Windows Clients
Windows Servers
Microsoft’s End-User License Agreement
Windows Threats and Vulnerabilities
Anatomy of Microsoft Windows Vulnerabilities
CryptoLocker
Locky
WannaCry
Discovery-Analysis-Remediation Cycle
Discovery
Analysis
Remediation
Common Forms of Attack
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 1 ASSESSMENT
CHAPTER 2 Security in the Microsoft Windows Operating System
Operating System Components and Architecture
The Kernel
Operating System Components
Basic Windows Operating System Architecture
Windows Run Modes
Kernel Mode
User Mode
Access Controls and Authentication
Authentication Methods
Access Control Methods
Security Access Tokens, Rights, and Permissions
Security Identifier
Access Rules, Rights, and Permissions
Users, Groups, and Active Directory
Workgroups
Active Directory
Windows Attack Surfaces and Mitigation
Multilayered Defense
Mitigation
Fundamentals of Microsoft Windows Security Monitoring and Maintenance
Security Monitoring
Identify Vulnerabilities
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 2 ASSESSMENT
PART II Managing and Maintaining Microsoft Windows Security
CHAPTER 3 Access Controls in Microsoft Windows
The Principle of Least Privilege
The Orange Book
Least Privilege and LUAs
Rights and Permissions
Access Models: Identification, Authentication, Authorization, ACLs, and More
Windows Server 2012, Windows Server 2016, and Windows Server 2019 Dynamic Access Control
User Account Control
Sharing SIDs and SATs
Managed Service Accounts
Kerberos
Windows Objects and Access Controls
Windows DACLs
DACL Advanced Permissions
SIDs, Globally Unique Identifiers, and Class Identifiers
Calculating Microsoft Windows Access Permissions
Auditing and Tracking Windows Access
Expression-Based Security Audit Policy (Windows Server 2012 and Newer)
Microsoft Windows Access Management Tools
Cacls.exe
Icacls.exe
Best Practices for Microsoft Windows Access Control
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 3 ASSESSMENT
CHAPTER 4 Microsoft Windows Encryption Tools and Technologies
Encryption Methods Microsoft Windows Supports
Encrypting File System, BitLocker, and BitLocker To Go
Encrypting File System
BitLocker
BitLocker To Go
Enabling File-, Folder-, and Volume-Level Encryption
Enabling EFS
Enabling BitLocker
Enabling BitLocker To Go
Encryption in Communications
Encryption Protocols in Microsoft Windows
TLS
IPSec
Virtual Private Network
Wireless Security
Microsoft Windows and Security Certificates
Public Key Infrastructure
Best Practices for Windows Encryption Techniques
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 4 ASSESSMENT
CHAPTER 5 Protecting Microsoft Windows against Malware
The Purpose of Malware
Types of Malware
Virus
Worm
Trojan Horse
Rootkit
Spyware
Ransomware
Malware Type Summary
Anti-Malware Software
Antivirus Software
Anti-Spyware Software
Malware Mitigation Techniques
Importance of Updating Your Software
Maintaining a Malware-Free Environment
Scanning and Auditing Malware
Tools and Techniques for Removing Malware
Malware Prevention Best Practices
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 5 ASSESSMENT
CHAPTER 6 Group Policy Control in Microsoft Windows
Group Policy and Group Policy Objects
Group Policy Settings
GPO Linking
Making Group Policy Conform to Security Policy
Security Responsibility
Security Policy and Group Policy
Group Policy Targets
Types of GPOs in the Registry
Local Group Policy Editor
GPOs in the Registry Editor
Types of GPOs in Active Directory
Group Policy Management Console
GPOs on the Domain Controller
Designing, Deploying, and Tracking Group Policy Controls
GPO Application Order
Security Filters
GPO Windows Management Instrumentation Filters
Deploying Group Policy
Auditing and Managing Group Policy
Group Policy Inventory
Analyzing the Effect of GPOs
Best Practices for Microsoft Windows Group Policy and Processes
Group Policy Design Guidelines
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 6 ASSESSMENT
CHAPTER 7 Microsoft Windows Security Profile and Audit Tools
Profiling Microsoft Windows Security
Profiling
Profiling Windows Computers
Microsoft Baseline Security Analyzer
MBSA Graphical User Interface
MBSA Command-Line Interface
OpenVAS
Nessus Essentials
Burp Suite Web Vulnerability Scanner
Microsoft Windows Security Audit
Microsoft Windows Security Audit Tools
Best Practices for Microsoft Windows Security Audits
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 7 ASSESSMENT
CHAPTER 8 Microsoft Windows Backup and Recovery Tools
Microsoft Windows Operating System and Application Backup and Recovery
The Need for Backups
The Backup Process
The Restore Process
Workstation, Server, Network, and Cloud Backup Techniques
Workstation Backups
Server Backups
Network Backups
Cloud Backups
Microsoft Windows and Application Backup and Recovery in a Business Continuity Setting
Disaster Recovery Plan
Business Continuity Plan
Where a Restore Fits In
Microsoft Windows Backup and Restore Utility
Restoring with the Windows Backup and Restore Utility
Restoring with the Windows Server Recovery Utility
Rebuilding Systems from Bare Metal
Managing Backups with Virtual Machines
Best Practices for Microsoft Windows Backup and Recovery
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 8 ASSESSMENT
CHAPTER 9 Microsoft Windows Network Security
Network Security
Network Security Controls
Principles of Microsoft Windows Network Security
Common Network Components
Connection Media
Networking Devices
Server Computers and Services Devices
Microsoft Windows Security Protocols and Services
Securing Microsoft Windows Environment Network Services
Service Updates
Service Accounts
Necessary Services
Securing Microsoft Windows Wireless Networking
Microsoft Windows Workstation Network Security
User Authorization and Authentication
Malicious Software Protection
Outbound Traffic Filtering
Microsoft Windows Server Network Security
Authentication and Authorization
Malicious Software Protection
Network Traffic Filtering
Internal Network and Cloud Security
IPv4 versus IPv6
Cloud Computing
Best Practices for Microsoft Windows Network Security
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 9 ASSESSMENT
CHAPTER 10 Microsoft Windows Security Administration
Security Administration Overview
The Security Administration Cycle
Security Administration Tasks
Maintaining the C-I-A Triad in the Microsoft Windows OS World
Maintaining Confidentiality
Maintaining Integrity
Maintaining Availability
Microsoft Windows OS Security Administration
Firewall Administration
Performance Monitor
Backup Administration
Operating System Service Pack Administration
Group Policy Administration
DACL Administration
Encryption Administration
Anti-Malware Software Administration
Ensuring Due Diligence and Regulatory Compliance
Due Diligence
The Need for Security Policies, Standards, Procedures, and Guidelines
Best Practices for Microsoft Windows OS Security Administration
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 10 ASSESSMENT
PART III Microsoft Windows OS and Application Security Trends and Directions
CHAPTER 11 Hardening the Microsoft Windows Operating System
Understanding the Hardening Process and Mindset
Strategies to Secure Windows Computers
Install Only What You Need
Security Compliance Toolkit
Manually Disabling and Removing Programs and Services
Hardening Microsoft Windows Operating System Authentication
Hardening the Network Infrastructure
Securing Directory Information and Operations
Hardening Microsoft Windows OS Administration
Hardening Microsoft Servers and Client Computers
Hardening Server Computers
Hardening Workstation Computers
Hardening Data Access and Controls
Hardening Communications and Remote Access
Authentication Servers
VPNs and Encryption
Hardening PKI
User Security Training and Awareness
Best Practices for Hardening Microsoft Windows OS and Applications
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 11 ASSESSMENT
CHAPTER 12 Microsoft Application Security
Principles of Microsoft Application Security
Common Application Software Attacks
Hardening Applications
Securing Key Microsoft Client Applications
Web Browser
Email Client
Productivity Software
File Transfer Software
AppLocker
Securing Key Microsoft Server Applications
Web Server
Email Server
Database Server
Enterprise Resource Planning Software
Line of Business Software
Cloud-Based Software
Case Studies in Microsoft Application Security
Best Practices for Securing Microsoft Windows Applications
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 12 ASSESSMENT
CHAPTER 13 Microsoft Windows Incident Handling and Management
Understanding and Handling Security Incidents Involving Microsoft Windows OS and Applications
Formulating an Incident Response Plan
Plan Like a Pilot
Plan for Anything that Could Cause Loss or Damage
Build the CSIRT
Plan for Communication
Plan Security
Revision Procedures
Plan Testing
Handling Incident Response
Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned
Incident Handling and Management Tools for Microsoft Windows and Applications
Investigating Microsoft Windows and Applications Incidents
Acquiring and Managing Incident Evidence
Types of Evidence
Chain of Custody
Evidence Collection Rules
Best Practices for Handling Microsoft Windows OS and Applications Incidents and Investigations
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 13 ASSESSMENT
CHAPTER 14 Microsoft Windows and the Security Life Cycle
Understanding Traditional System Life Cycle Phases
Agile Software Development
Managing Microsoft Windows OS and Application Software Security
Developing Secure Microsoft Windows OS and Application Software
Implementing, Evaluating, and Testing Microsoft Windows OS and Application Software Security
Maintaining the Security of Microsoft Windows OS and Application Software
Microsoft Windows OS and Application Software Revision, Change Management, and End-of-Life
Phaseout
Software Development Areas of Difficulty
Software Control
Software Configuration Management
Best Practices for Microsoft Windows and Application Software Development Security
Investigations
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 14 ASSESSMENT
CHAPTER 15 Best Practices for Microsoft Windows and Application Security
Basic Rules of Microsoft Windows OS and Application Security
Administrative best practices
Technical best practices
Audit and Remediation Cycles
Security Policy Conformance Checks
Security Baseline Analysis
OS and Application Checks and Upkeep
Network Management Tools and Policies
Software Testing, Staging, and Deployment
Compliance/Currency Tests on Network Entry
Trends in Microsoft Windows OS and Application Security Management
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 15 ASSESSMENT
APPENDIX A Answer Key
APPENDIX B Standard Acronyms
Glossary of Key Terms
References
Index

Michael G. Solomon, PhD, CISSP, PMP, CISM, CySA+, Pentest+, is an author, educator, and consultant focusing on privacy, security, blockchain, and identity management. As an IT professional and consultant since 1987, Dr. Solomon has led project teams for many Fortune 500 companies and has authored and contributed to more than 30 books and numerous training courses. Dr. Solomon is a Professor of Computer and Information Sciences at the University of the Cumberlands and holds a Ph.D. in Computer Science and Informatics from Emory University.

What makes us different?

• Instant Download

• Always Competitive Pricing

• 100% Privacy

• FREE Sample Available

• 24-7 LIVE Customer Support

Reviews (1)

1 review for Security Strategies in Windows Platforms and Applications 3rd Edition by Michael G. Solomon, ISBN-13: 978-1284175622

  1. Nathan Scott (verified owner) – August 13, 2024

    Rated 4 out of 5

    Excellent service, eBook delivered in no time.

Add a review Cancel reply

You must be logged in to post a review.

Shipping & Delivery

You will receive the link of your eBook 30 seconds after purchase on your email (check you email or junk mail), and you can login to your account at anytime using your username to read or download your eBook.

If you have any problem or any other questions, you can email us or try the chat widget.

Visit contact us.

Related products

-61%
Programming Multicore and Many-core Computing Systems, ISBN-13: 978-0470936900
Compare

Programming Multicore and Many-core Computing Systems, ISBN-13: 978-0470936900

Computing
$50.00 Original price was: $50.00.$19.50Current price is: $19.50.
Rated 4.00 out of 5
Programming Multicore and Many-core Computing Systems, ISBN-13: 978-0470936900 [PDF eBook eTextbook] Series: Wiley Series on Parallel and Distributed Computing (Book
Add to wishlist
Add to cart
Quick view
-60%
SPSS Demystified 3rd Edition by Ronald Yockey, ISBN-13: 978-1138286283
Compare

SPSS Demystified 3rd Edition by Ronald Yockey, ISBN-13: 978-1138286283

Computing
$50.00 Original price was: $50.00.$19.99Current price is: $19.99.
Rated 4.00 out of 5
SPSS Demystified 3rd Edition by Ronald Yockey, ISBN-13: 978-1138286283 [PDF eBook eTextbook] 276 pages Publisher: Routledge; 3 edition (August 22,
Add to wishlist
Add to cart
Quick view
-70%
T-SQL Fundamentals 3rd Edition by Itzik Ben-Gan, ISBN-13: 978-1509302000
Compare

T-SQL Fundamentals 3rd Edition by Itzik Ben-Gan, ISBN-13: 978-1509302000

Computing
$50.00 Original price was: $50.00.$14.99Current price is: $14.99.
Rated 5.00 out of 5
T-SQL Fundamentals 3rd Edition by Itzik Ben-Gan, ISBN-13: 978-1509302000 [PDF eBook eTextbook]   Publisher: Microsoft Press; 3rd edition (August 3,
Add to wishlist
Add to cart
Quick view
-83%
Systems Analysis and Design 9th Edition Kenneth E. Kendall, ISBN-13: 978-0133023442
Compare

Systems Analysis and Design 9th Edition Kenneth E. Kendall, ISBN-13: 978-0133023442

Computing
$50.00 Original price was: $50.00.$8.74Current price is: $8.74.
Rated 5.00 out of 5
Systems Analysis and Design 9th Edition by Kenneth E. Kendall, ISBN-13: 978-0133023442 [PDF eBook eTextbook] Publisher: Pearson; 9th edition (January
Add to wishlist
Add to cart
Quick view
-75%
Starting Out with Python 4th Edition, ISBN-13: 978-0134444321
Compare

Starting Out with Python 4th Edition, ISBN-13: 978-0134444321

Computing
$50.00 Original price was: $50.00.$12.43Current price is: $12.43.
Rated 4.00 out of 5
Starting Out with Python 4th Edition, ISBN-13: 978-0134444321 [PDF eBook eTextbook]   Publisher: Pearson; 4th edition (March 6, 2017) Language:
Add to wishlist
Add to cart
Quick view
-80%
Python 3 for Machine Learning by Oswald Campesato, ISBN-13: 978-1683924951
Compare

Python 3 for Machine Learning by Oswald Campesato, ISBN-13: 978-1683924951

Computing
$50.00 Original price was: $50.00.$9.99Current price is: $9.99.
Rated 4.00 out of 5
Python 3 for Machine Learning by Oswald Campesato, ISBN-13: 978-1683924951  [PDF eBook eTextbook] Publisher: ‎ Mercury Learning and Information (March
Add to wishlist
Add to cart
Quick view
-64%
Security in Fixed and Wireless Networks 2nd Edition, ISBN-13: 978-1119040743
Compare

Security in Fixed and Wireless Networks 2nd Edition, ISBN-13: 978-1119040743

Computing
$50.00 Original price was: $50.00.$17.88Current price is: $17.88.
Rated 5.00 out of 5
Security in Fixed and Wireless Networks 2nd Edition, ISBN-13: 978-1119040743 [PDF eBook eTextbook]    624 pages ISBN-10: 1119040744 ISBN-13: 978-1119040743
Add to wishlist
Add to cart
Quick view
-50%
Auditing IT Infrastructures for Compliance 2nd Edition, ISBN-13: 978-1284090703
Compare

Auditing IT Infrastructures for Compliance 2nd Edition, ISBN-13: 978-1284090703

Computing
$50.00 Original price was: $50.00.$24.99Current price is: $24.99.
Rated 5.00 out of 5
Auditing IT Infrastructures for Compliance (Information Systems Security & Assurance) 2nd Edition, ISBN-13: 978-1284090703 [PDF eBook eTextbook]   Series: Information
Add to wishlist
Add to cart
Quick view

Free Shipping.

Via Email.

24/7 Support.

Contact Or Chat With Us.

Online Payment.

One Time Payement.

Fast Delivery.

30 Seconds After Purchase.

  • OUR COMPANY
    • EducationaleBook LLC
    • Email: [email protected]
    • Website: edebook.com
  • USEFUL LINKS
    • Home
    • Shop
    • Wishlist
    • Blog
  • OUR POLICY
    • Privacy Policy
    • Refund Policy
    • Terms & Conditions
    • DMCA
  • INFORMATIONS
    • About Us
    • FAQ
    • Contact Us
    • Request an eBook

Payment System:

EDEBOOK 2024 CREATED BY EDucationaleBook LLC. PREMIUM E-COMMERCE SOLUTIONS.
  • Home
  • Shop
  • Blog
  • About us
  • Contact us
  • Request an eBook
  • Wishlist
  • Compare
  • Login / Register
Shopping cart
Close
Sign in
Close

Lost your password?

No account yet?

Create an Account
Shop
Wishlist
6 items Cart
My account