Protect Your Windows Network from Perimeter to Data

Networks are the "nervous system" of any business and, as such, it is critical to protect the network from outside attacks. This chapter explains how you can best protect your systems network by balancing security and usability/usefulness.

Introduction to Network Protection

Protect Your Windows Network from Perimeter to Data Click here

Click here to download Chapter 1. (PDF)

About the Authors:
Riley, Steve:
Steve Riley is a Senior Program Manager in Microsoft's Security Business and Technology Unit in Redmond, Washington. Steve specializes in network and host security, communication protocols, network design, and information security policies and process. His customers include various ISPs and ASPs around the United States, as well as traditional enterprise IT customers, for whom he has conducted security assessments and risk analyses, deployed technologies for prevention and detection, and designed highly available network architectures. Steve is a frequent and popular speaker at conferences worldwide, often appearing in Asia one week and Europe the next. When not evangelizing the benefits of Microsoft security technology, he spends time with customers to better understand the security pain they face and show how some of that pain can be eliminated.

Johansson, Jesper:
Jesper Johansson is Program Manager for Security Policy at Microsoft. In this position, Jesper is responsible for the tools customers use to implement security policies, such as the Security Configuration Wizard, Security Configuration Editor, and related tools. He has delivered speeches on network security all over the world and is a frequent speaker at conferences and workshops, particularly in places that lend themselves to great diving. He has a Ph.D. in Management Information Systems and is a Certified Information Systems Security Professional (CISSP) and a certified Information Systems Security Architecture Professional (ISSAP).

Chapter 1 of by Jesper Johansson and Steve Riley explains how you can best protect your systems network by balancing security and usability/usefulness. (ISBN 0321336437, Copyright 2005. Reproduced with permission from Pearson publishing as Addison-Wesley Professional. for a detailed description and to learn how to purchase this title.)
This was last published in August 2005

Dig Deeper on Working With Servers and Desktops

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.