Professional Windows Desktop and Server Hardening

Professional Windows Desktop and Server Hardening

by Roger A. Grimes


Choose Expedited Shipping at checkout for delivery by Tuesday, August 10


  • Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products
  • Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security
  • As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years
  • The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book

Related collections and offers

Product Details

ISBN-13: 9780764599903
Publisher: Wiley
Publication date: 05/28/2006
Series: Programmer to Programmer Series
Pages: 604
Product dimensions: 7.42(w) x 9.21(h) x 1.40(d)

About the Author

Roger A. Grimes (CPA, CISSP, MCSE: Security, MVP, CEH, CHFI, TICSA) is a 20-year computer security consultant, writer, and teacher. He has written over a 150 national magazine articles on computer security, and this is his fifth book on Microsoft Windows security. He has consulted for many of the world’s best-known enterprises (including McAfee, Microsoft, Verisign, and IBM), multiple universities, cities and school systems, plus every branch of the U.S. armed forces. He is currently a highly rated instructor teaching Windows and Linux security in Foundstone’s Ultimate Hacking classes. He has presented at many of the industry’s largest conferences, including MCP TechMentor, Windows Connections, and SANS. He was a contributing editor for Windows IT Pro magazine, and is the security columnist for InfoWorld magazine. He has written several advanced security courses, including for Microsoft. He is a three-year recipient of Microsoft’s Most Valuable Professional (MVP) award, and was the creator and team leader of the successful contest.

Read an Excerpt

Click to read or download

Table of Contents



Part I: The Basics in Depth.

Chapter 1: Windows Attacks.

Chapter 2: Conventional and Unconventional Defenses.

Chapter 3: NTFS Permissions 101.

Part II: OS Hardening.

Chapter 4: Preventing Password Crackers.

Chapter 5: Protecting High-Risk Files.

Chapter 6: Protecting High-Risk Registry Entries.

Chapter 7: Tightening Services.

Chapter 8: Using IPSec.

Part III: Application Security.

Chapter 9: Stopping Unauthorized Execution.

Chapter 10: Securing Internet Explorer.

Chapter 11: Protecting E-mail.

Chapter 12: IIS Security.

Chapter 13: Using Encrypting File System.

Part IV: Automating Security.

Chapter 14: Group Policy Explained.

Chapter 15: Designing a Secure Active Directory Infrastructure.

Book Summary.


Customer Reviews