Two Microsoft managers describe the defense-in-depth model for network protection, which is loosely based on the seven layer open system interconnect (OSI) model. After reviewing the importance of security policies and condescending to those "pesky users," they provide techniques for protecting physical controls, networks, hosts, applications, and data. The CD-ROM contains a password generator, an SQL script to revoke all permissions from the public login, and a slipstreaming tool. Annotation ฉ2005 Book News, Inc., Portland, OR
Part 1 Introduction and Fundamentals
Part 2 Anatomy of a Hack-The Rise and Fall of Your Network
Part 3 Policies, Precedures, and User Awareness
Part 4 Protecting Your Network Inside the Perimeter
Part 5 Protecting Hosts
Part 6 Protecting Applications
Part 7 Protecting Data
Appenlix A: How to Get Your Network Hacked in 10 Easy Steps
Appenlix B: Script To Revoke SQL Server PUBLIC Permissions
Appenlix C: HOSTS file to Block Spyware
Appenlix D: Password Generator Tool
Appenlix E: 10 Immutable Laws of Security
Index