Microsoft Encyclopedia of Security / Mitch Tulloch.. Microsoft Press books are available through booksellers and distributors worldwide.. For further informa tion about international ed
Trang 2Library of Congress CataloginginPublication Data
Tulloch, Mitch
Microsoft Encyclopedia of Security / Mitch Tulloch
p cm
ISBN 0735618771
1 Computer securityEncyclopedias 2 Computer networksSecurity
measures-Encyclopedias I Title
005.'8'03dc21
Printed and bound in the United States of America
Distributed in Canada by H.B Fenn and Company Ltd
A CIP catalogue record for this book is available from the British Library
Microsoft Press books are available through booksellers and distributors worldwide For further informa tion about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax (425) 9367329 Visit our Web site at www.microsoft.com/mspress
Send comments to mspinput@microsoft.com
Active Directory, ActiveX, Authenticode, BackOffice, Hotmail, Microsoft, Microsoft Press, MSDOS, MSDN, MSN, Windows, Windows NT, and Windows Server are either registered trademarks or trade marks of Microsoft Corporation in the United States and/or other countries Other product and company names mentioned herein may be the trademarks of their respective owners
The example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious No association with any real company, organization, product, domain name, email address, logo, person, place, or event is intended or should be inferred
Acquisitions Editor: Jeff Koch
Project Editor: Sandra Haynes
Body Part No X0945918
Trang 3Dedicated to Neil Salkind, my agent and friend
Trang 5Acknowledgements xxi
Introduction xxiii
What Is Computer Security? xxiii
Threats and Vulnerabilities xxiii
Standards and Protocols xxiii
Hacking and Cracking xxiv
Tools and Procedures xxv
Organizations and Certifications xxv
Cryptography xxv
Legal Issues xxvi
Who This Work Is For xxvi
How This Work Is Organized xxvi
Disclaimer xxvii
Comments and Questions xxvii
Alphabetical Reference of Terms Numbers A 802.11i 3
2600 3
ACK storm 10
ACL 11
AclDiag 11
ACPA 11
ACSA 11
ACSAC 11
Active Directory 11
adaptive proxy 12
Adaptive Security Algorithm (ASA) 12
address-based authentication 12
address munging 13
address spoofing 13
Administrator 13
v
Trang 6Thanks to my wife and business partner, Ingrid Tulloch, who was coauthor of our previous project with Microsoft
Press, the Microsoft Encyclopedia of Networking, Second Edition Thanks, Schatz, for contributing endless long
hours of research and numerous helpful suggestions to assist me in writing this work What a wife!
Thanks to the terrific team at Microsoft Press (mspress.microsoft.com) and nSight (www.nsightworks.com), including
Jeff Koch, Sandra Haynes, Valerie Woolley, Susan McClung, Thomas Keegan, and Christina Palaia for their hard work and excellent suggestions What a team!
Thanks to Neil Salkind of Studio B (www.studiob.com), my friend and literary agent who represented me in this
project What an agent!
Thanks to MTS Communications Inc (www.mts.ca), for providing our company with Internet and Web hosting
services What a company!
And thanks finally to Ken and Bonnie Lewis, our best friends, and their four terrific kids, Karina, Alana, Sheri, and Vanessa, for encouraging us and praying for us as we worked on this project What a family! And what friends! Mitch Tulloch
www.mtit.com
xxi