Protect Your Windows Network from Perimeter to Data

Networks are the "nervous system" of any business and, as such, it is critical to protect the network from outside attacks. This chapter explains how you can best protect your systems network by balancing security and usability/usefulness.

Introduction to Network Protection

Protect Your Windows Network from Perimeter to Data Click here

Click here to download Chapter 1. (PDF)

About the Authors:
Riley, Steve:
Steve Riley is a Senior Program Manager in Microsoft's Security Business and Technology Unit in Redmond, Washington. Steve specializes in network and host security, communication protocols, network design, and information security policies and process. His customers include various ISPs and ASPs around the United States, as well as traditional enterprise IT customers, for whom he has conducted security assessments and risk analyses, deployed technologies for prevention and detection, and designed highly available network architectures. Steve is a frequent and popular speaker at conferences worldwide, often appearing in Asia one week and Europe the next. When not evangelizing the benefits of Microsoft security technology, he spends time with customers to better understand the security pain they face and show how some of that pain can be eliminated.

Johansson, Jesper:
Jesper Johansson is Program Manager for Security Policy at Microsoft. In this position, Jesper is responsible for the tools customers use to implement security policies, such as the Security Configuration Wizard, Security Configuration Editor, and related tools. He has delivered speeches on network security all over the world and is a frequent speaker at conferences and workshops, particularly in places that lend themselves to great diving. He has a Ph.D. in Management Information Systems and is a Certified Information Systems Security Professional (CISSP) and a certified Information Systems Security Architecture Professional (ISSAP).

Chapter 1 of by Jesper Johansson and Steve Riley explains how you can best protect your systems network by balancing security and usability/usefulness. (ISBN 0321336437, Copyright 2005. Reproduced with permission from Pearson publishing as Addison-Wesley Professional. for a detailed description and to learn how to purchase this title.)
This was first published in August 2005

Dig deeper on Working With Servers and Desktops

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close