[ISN] REVIEW: "Windows NT Server 4 Security Handbook"

From: mea culpa (jerichoat_private)
Date: Fri Nov 06 1998 - 20:45:45 PST

  • Next message: mea culpa: "[ISN] Core SDI Presenting 2 Papers on Information Security at DISC'98"

    From: "Rob Slade" <rsladeat_private>
    
    BKNT4SHB.RVW   980814
    
    "Windows NT Server 4 Security Handbook", Lee Hadfield/Dave Hatter/Dave
    Bixler, 1997, 0-7897-1213-X, U$39.99/C$56.95/UK#36.99
    %A   Lee Hadfield
    %A   Dave Hatter dhatterat_private
    %A   Dave Bixler dbixler@art-deco.net
    %C   201 W. 103rd Street, Indianapolis, IN   46290
    %D   1997
    %G   0-7897-1213-X
    %I   Macmillan Computer Publishing (MCP)
    %O   U$39.99/C$56.95/UK#36.99 800-858-7674 infoat_private
    %P   476 p.
    %T   "Windows NT Server 4 Security Handbook"
    
    Part one is an overview, both of security and Windows NT.  Chapter one's
    presentation of security basics has many good points, but also some
    unfortunate gaps and errors.  The review of security concepts in NT
    provides
    a good grounding in how the matter is seen from Microsoft's perspective in
    chapter two.  (It also has a rather interesting quick introduction to
    firewalls.)  The NT architecture overview in chapter three does not really
    concentrate on security topics.  When it does, the coverage of access
    control is reasonably clear, if not terribly readable.
    
    The Implementation of security, in part two, explains individual functions
    well but does not provide conceptual frameworks for security operations.
    Most of the material does provide the ideas behind a feature, but then
    simply follows through the screens for turning it on.  Topics include
    domains, trust relationships, NTFS (New Technology File System) security,
    protecting domain resources, and NT Workstation security.  Somewhat
    different is chapter six, which gives a thorough tutorial on internal user
    authentication procedures.
    
    Part three walks through the implementation of a master domain network.
    Chapters cover planning, implementation steps, and configuration of trust
    relationships, but the material is too brief for a realistic guide.  Part
    four looks at security for various related products, such as BackOffice,
    NetWare, Macintosh, Internet, and UNIX.  Again, there are more mentions
    than
    working details.  Part five first explains and then walks you through
    implementation for C-2 security configuration.
    
    Of those I have reviewed to date, this book delves deepest into many areas
    of NT security and protection.  However, it still does not draw back the
    shroud surrounding the NT security model.  The explanations of operations
    are clear and there is much useful information, but still no clear
    direction
    to the besieged sysadmin.
    
    copyright Robert M. Slade, 1998   BKNT4SHB.RVW   980814
    
    
    
    -o-
    Subscribe: mail majordomoat_private with "subscribe isn".
    Today's ISN Sponsor: Repent Security Incorporated [www.repsec.com]
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:10:23 PDT