Windows Security Internals with PowerShell

فهرست مطالب کتاب Windows Security Internals with PowerShell:

Introduction

Chapter 1: Setting Up a PowerShell Testing Environment

PART I: An Overview of the Windows Operating System

Chapter 2: The Windows Kernel

Chapter 3: User-Mode Applications

PART II: The Windows Security Reference Monitor

Chapter 4: Security Access Tokens

Chapter 5: Security Descriptors

Chapter 6: Reading and Assigning Security Descriptors

Chapter 7: Access Checking

Chapter 8: Other Access Checking Use Cases

Chapter 9: Security Auditing

PART III: The Local Security Authority and Authentication

Chapter 10: Local Authentication

Chapter 11: Active Directory

Chapter 12: Interactive Authentication

Chapter 13: Network Authentication

Chapter 14: Kerberos Authentication

Chapter 15: Negotiate Authentication and Other Security Packages

Appendix A: Building a Windows Domain Network for Testing

Appendix B: SDDL SID Constants

Zero Trust Architecture – Cisco Press

فهرست مطالب کتاب Zero Trust Architecture – Cisco Press:

Preface

Introduction

Chapter 1 Overview of Zero Trust (ZT)

Chapter 2 Zero Trust Capabilities

Chapter 3 Zero Trust Reference Architecture

Chapter 4 Zero Trust Enclave Design

Chapter 5 Enclave Exploration and Consideration

Chapter 6 Segmentation

Chapter 7 Zero Trust Common Challenges

Chapter 8 Developing a Successful Segmentation Plan

Chapter 9 Zero Trust Enforcement

Chapter 10 Zero Trust Operations

Chapter 11 Conclusion

Appendix A Applied Use Case for Zero Trust Principles

Index