Franklin

Least privilege security for Windows 7, Vista, And XP [electronic resource] : secure desktops for regulatory compliance and business agility / Russell Smith.

Other records:
Author/Creator:
Smith, Russell.
Publication:
Birmingham, U.K. : Packt Enterprise, 2010.
Format/Description:
Book
1 online resource (464 p.)
Subjects:
Computer security.
Form/Genre:
Electronic books.
Language:
English
Summary:
Secure Microsoft Windows desktops with least privilege security for regulatory compliance and business agility with this book and eBook
Contents:
Cover; Copyright; Credits; About the Author; About the Reviewers; Table of Contents; Preface; Chapter 1: An Overview of Least Privilege Security in Microsoft Windows; What is privilege?; What is Least Privilege Security?; Limiting the damage from accidental errors with Least Privilege Security; Reducing system access to the minimum with Least Privilege Security; Least Privilege Security in Windows; Windows 9.x; Windows NT (New Technology); Windows 2000; Windows XP; Windows Vista; Windows 7; Advanced Least Privilege Security concepts; Discretionary Access Control; Mandatory Access Control
Mandatory Integrity ControlRole-based Access Control; Least Privilege Security in the real world; Benefits of Least Privilege Security on the desktop; Change and configuration management; Damage limitation; Regulatory compliance; Software licensing; What problems does Least Privilege Security not solve?; Common challenges of Least Privilege Security on the desktop; Application compatibility; System integrity; End user support; Least Privilege and your organization's bottom line; Determining the affect of Least Privilege Security on productivity; Reducing total cost of ownership
Improved securitySummary; Chapter 2: Political and Cultural Challenges for Least Privilege Security; Company culture; Defining company culture; Culture shock; Culture case studies; Company A; Company B; Getting support from management; Selling Least Privilege Security; Using key performance indicators; Using key risk indicators; Mapping CSFs to KPIs; Security metrics; Threat modeling; Reducing costs; Security adds business value; Setting an example; User acceptance; Least Privilege Security terminology; Justifying the decision to implement Least Privilege Security
Applying Least Privilege Security throughout the enterpriseDeciding whom to exempt from running with a standard user account; What not to do; Managing expectations; Service catalog; Chargebacks; Maintaining flexibility; User education; Summary; Chapter 3: Solving Least Privilege Problems with the Application Compatibility Toolkit; Quick compatibility fixes using the Program Compatibility Wizard; Applying compatibility modes to legacy applications; Program Compatibility Wizard; Program Compatibility Assistant; Disabling the Program Compatibility Assistant
Excluding executables from the Program Compatibility AssistantAchieving application compatibility in enterprise environments; Compatibility fixes; Modifying applications using shims; Enhancing security using compatibility shims; Deciding whether to use a shim to solve a compatibility problem; Creating shims for your legacy applications; Solving compatibility problems with shims; LUA compatibility mode fixes in Windows XP; Creating your own custom database; Maxthon on Windows XP; Working with other commonly used compatibility fixes; Working with custom databases
Adding new shims to your custom database (merging custom databases)
Notes:
Includes index.
ISBN:
1-282-70335-8
9786612703355
1-84968-005-1
OCLC:
796383650
Loading...
Location Notes Your Loan Policy
Description Status Barcode Your Loan Policy