|Hacking Exposed Windows
By Joel Scambray
Have a look inside the third edition of Hacking Exposed Windows : Microsoft Windows Security Secrets and Solutions...
Step 2 of 2:
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
by Joel Scambray, with this excerpt from chapter 12, "Windows security features and tools."
In "Hacking Exposed Windows," author Joel Scambray shares a series of tips on tools and features that can improve security in Windows systems. Learn how Windows Resource Protection (WRP) can protect critical systems, how to secure BitLocker configurations and how User Account Control (UAC) is making life difficult for malicious hackers.
Service level security in Windows Vista and Windows Server 2008
Service level security received a boost in Vista and Windows Server 2008 with Windows Service Hardening. See how Windows Server Hardening can aid Windows security here.
Buffer overflows can be prevented by GS cookies
Buffer overflows have plagued Windows users for years, but by using a compile time technology known as GS cookies, you can prevent them from damaging your Windows shop.
Windows Resource Protection (WRP) protects critical system resources
Find out how Windows Resource Protection (WRP) has evolved from Windows File Protection (WFP) to ensure that critical system resources are not modified.
The finer points of User Account Control (UAC) in Windows Vista
User Account Control (UAC) has been unpopular since Windows Vista was released, but it's still raising the bar for hackers. See how in this excerpt from "Hacking Exposed Windows."
How to secure BitLocker configurations
Learn about BitLocker's configuration options in this excerpt from "Hacking Exposed Windows" and improve security in your Windows shop.
Windows Integrity Control (WIC) in Vista
Windows Integrity Control (WIC) is a security feature in Vista that applies integrity levels to objects to determine whether or not the OS can trust them. Learn about WIC here.