LEADER 00972nam 2200253 a 4500
006 m o d |
007 cr -n---------
008 110121s2010 enka o 001 0 eng d
a| MiAaPQ c| MiAaPQ d| MiAaPQ
a| QA76.9.A25 b| S65 2010
a| QA76.9.A25 b| S65 2010
a| Smith, Russell.
a| Least privilege security for Windows 7, Vista, And XP h| [electronic resource] : b| secure desktops for regulatory compliance and business agility / c| Russell Smith.
a| Birmingham, U.K. : b| Packt Enterprise, c| 2010.
a| 1 online resource (464 p.)
a| text b| txt
a| computer b| c
a| online resource b| cr
a| Cover; Copyright; Credits; About the Author; About the Reviewers; Table of Contents; Preface; Chapter 1: An Overview of Least Privilege Security in Microsoft Windows; What is privilege?; What is Least Privilege Security?; Limiting the damage from accidental errors with Least Privilege Security; Reducing system access to the minimum with Least Privilege Security; Least Privilege Security in Windows; Windows 9.x; Windows NT (New Technology); Windows 2000; Windows XP; Windows Vista; Windows 7; Advanced Least Privilege Security concepts; Discretionary Access Control; Mandatory Access Control
a| Mandatory Integrity ControlRole-based Access Control; Least Privilege Security in the real world; Benefits of Least Privilege Security on the desktop; Change and configuration management; Damage limitation; Regulatory compliance; Software licensing; What problems does Least Privilege Security not solve?; Common challenges of Least Privilege Security on the desktop; Application compatibility; System integrity; End user support; Least Privilege and your organization's bottom line; Determining the affect of Least Privilege Security on productivity; Reducing total cost of ownership
a| Improved securitySummary; Chapter 2: Political and Cultural Challenges for Least Privilege Security; Company culture; Defining company culture; Culture shock; Culture case studies; Company A; Company B; Getting support from management; Selling Least Privilege Security; Using key performance indicators; Using key risk indicators; Mapping CSFs to KPIs; Security metrics; Threat modeling; Reducing costs; Security adds business value; Setting an example; User acceptance; Least Privilege Security terminology; Justifying the decision to implement Least Privilege Security
a| Applying Least Privilege Security throughout the enterpriseDeciding whom to exempt from running with a standard user account; What not to do; Managing expectations; Service catalog; Chargebacks; Maintaining flexibility; User education; Summary; Chapter 3: Solving Least Privilege Problems with the Application Compatibility Toolkit; Quick compatibility fixes using the Program Compatibility Wizard; Applying compatibility modes to legacy applications; Program Compatibility Wizard; Program Compatibility Assistant; Disabling the Program Compatibility Assistant
a| Excluding executables from the Program Compatibility AssistantAchieving application compatibility in enterprise environments; Compatibility fixes; Modifying applications using shims; Enhancing security using compatibility shims; Deciding whether to use a shim to solve a compatibility problem; Creating shims for your legacy applications; Solving compatibility problems with shims; LUA compatibility mode fixes in Windows XP; Creating your own custom database; Maxthon on Windows XP; Working with other commonly used compatibility fixes; Working with custom databases
a| Adding new shims to your custom database (merging custom databases)
a| Secure Microsoft Windows desktops with least privilege security for regulatory compliance and business agility with this book and eBook
a| Includes index.
a| Computer security.
a| Electronic books.