+

Tulyagijja, 2003 - Google Patents

Implementing a secure windows 2000 servers for the internet

Tulyagijja, 2003

View PDF
Document ID
14758212500344473084
Author
Tulyagijja C
Publication year

External Links

Snippet

This project identifies internet security issues, comparing the security features between Windows NT and 2000 and demonstrating the perimeter network concept. Moreover, this project also includes the techniques on how to install, configure, set up remote …
Continue reading at repository.au.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2097Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements maintaining the standby controller/processing unit updated
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party

Similar Documents

Publication Publication Date Title
US11632396B2 (en) Policy enforcement using host information profile
US9231973B1 (en) Automatic intervention
US7353533B2 (en) Administration of protection of data accessible by a mobile device
CN108600251B (en) Mobile device management and security
US7526800B2 (en) Administration of protection of data accessible by a mobile device
US20080109679A1 (en) Administration of protection of data accessible by a mobile device
WO2004057834A2 (en) Methods and apparatus for administration of policy based protection of data accessible by a mobile device
Cherry Securing SQL Server: protecting your database from attackers
Norberg Securing Windows NT/2000 servers for the internet
May et al. Advanced information assurance handbook
Scarfone et al. Guide to enterprise telework and remote access security
Tulyagijja Implementing a secure windows 2000 servers for the internet
Beuchelt UNIX and Linux security
Viegas et al. IT security technical controls
Souppaya et al. Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
Hontañón Linux Security: Craig Hunt Linux Library
Neagu Oracle 11g Anti-hacker's Cookbook
Smyth Security+ Essentials
Scarfone et al. Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
Kilemark Secure working from home in an industrial context
Danseglio et al. Windows Server 2003 Security Cookbook: Security Solutions and Scripts for System Administrators
Dalwadi Network And Data Security
Headquarters Security Best Practices Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted
Walker IV Guide to the Secure Configuration and Administration of Microsoft Internet Information Services 5.0®
Goktepe Windows XP Operating System security analysis
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载