Chapter Download

Protect Your Windows Network from Perimeter to Data

Introduction to Network Protection

Chapter 1 of Protect Your Windows Network from Perimeter to Data by Jesper Johansson and Steve Riley explains how you can best protect your systems network by balancing security and usability/usefulness. (ISBN 0321336437, Copyright 2005. Reproduced with permission from Pearson publishing as Addison-Wesley Professional. Click here for a detailed description and to learn how to purchase this title.)

Click here to download Chapter 1. (PDF)

About the Authors:
Riley, Steve:
Steve Riley is a Senior Program Manager in Microsoft's Security Business and Technology Unit in Redmond, Washington. Steve specializes in network and host security, communication protocols, network design, and information security policies and process. His customers include various ISPs and ASPs around the United States, as well as traditional enterprise IT customers, for whom he has conducted security assessments and risk analyses, deployed technologies for prevention and detection, and designed highly available network architectures. Steve is a frequent and popular speaker at conferences worldwide, often appearing in Asia one week and Europe the next. When not evangelizing the benefits of Microsoft security technology, he spends time with customers to better understand the security pain they face and show how some of that pain can be eliminated.

Johansson, Jesper:
Jesper Johansson is Program Manager for Security Policy at Microsoft. In this position, Jesper is responsible for the tools customers use to implement security policies, such as the Security Configuration Wizard, Security Configuration Editor, and related tools. He has delivered speeches on network security all over the world and is a frequent speaker at conferences and workshops, particularly in places that lend themselves to great diving. He has a Ph.D. in Management Information Systems and is a Certified Information Systems Security Professional (CISSP) and a certified Information Systems Security Architecture Professional (ISSAP).

This was first published in August 2005

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: