جزییات کتاب
Content: Authors, Pages v-viContributor, Page viTechnical Editor and Contributor, Page viAbout the CD-ROM, Page xivForeword and Acknowledgements, Pages xv-xviChapter 1 - Defending the Network with ISA Server—and Beyond, Pages 1-68Chapter 2 - Defense Plan 1: The Trihomed DMZ, Pages 69-116Chapter 3 - Defense Plan 2: The Back-to-Back DMZ, Pages 117-209Chapter 4 - Defense Plan 3: The Internal “Pseudo” DMZ, Pages 211-254Chapter 5 - Defense Plan 4: Advanced Server Publishing, Pages 255-356Chapter 6 - Defense Plant 5: Protecting Mail Services, Pages 357-446Chapter 7 - Understanding Windows Default Access Control Settings, Pages 447-485Chapter 8 - Using the Security Configuration Tool Set, Pages 487-531Chapter 9 - Defending Your Data with the Encrypting File System, Pages 533-576Chapter 10 - Protecting Data in Transit with IP Security, Pages 577-626Chapter 11 - Authenticating Users with Smart Cards, Pages 627-653Chapter 12 - Creating a Public Key Infrastructure with Certificate Services, Pages 655-726Chapter 13 - Keeping Your IIS Web Servers Safe, Pages 727-772Appendix A - Defending Your 802.11 Wireless Network, Pages 773-828Index, Pages 829-846