Windows Security Internals with PowerShell
فهرست مطالب کتاب Windows Security Internals with PowerShell:
Introduction
Chapter 1: Setting Up a PowerShell Testing Environment
PART I: An Overview of the Windows Operating System
Chapter 2: The Windows Kernel
Chapter 3: User-Mode Applications
PART II: The Windows Security Reference Monitor
Chapter 4: Security Access Tokens
Chapter 5: Security Descriptors
Chapter 6: Reading and Assigning Security Descriptors
Chapter 7: Access Checking
Chapter 8: Other Access Checking Use Cases
Chapter 9: Security Auditing
PART III: The Local Security Authority and Authentication
Chapter 10: Local Authentication
Chapter 11: Active Directory
Chapter 12: Interactive Authentication
Chapter 13: Network Authentication
Chapter 14: Kerberos Authentication
Chapter 15: Negotiate Authentication and Other Security Packages
Appendix A: Building a Windows Domain Network for Testing
Appendix B: SDDL SID Constants
Zero Trust Architecture – Cisco Press
فهرست مطالب کتاب Zero Trust Architecture – Cisco Press:
Preface
Introduction
Chapter 1 Overview of Zero Trust (ZT)
Chapter 2 Zero Trust Capabilities
Chapter 3 Zero Trust Reference Architecture
Chapter 4 Zero Trust Enclave Design
Chapter 5 Enclave Exploration and Consideration
Chapter 6 Segmentation
Chapter 7 Zero Trust Common Challenges
Chapter 8 Developing a Successful Segmentation Plan
Chapter 9 Zero Trust Enforcement
Chapter 10 Zero Trust Operations
Chapter 11 Conclusion
Appendix A Applied Use Case for Zero Trust Principles
Index