| Table of Contents |
| Professional Windows Desktop and Server Hardening |
| Introduction |
| Part I - The Basics in Depth |
| Chapter 1 | - | Windows Attacks |
| Chapter 2 | - | Conventional and Unconventional Defenses |
| Chapter 3 | - | NTFS Permissions 101 |
| Part II - OS Hardening |
| Chapter 4 | - | Preventing Password Crackers |
| Chapter 5 | - | Protecting High-Risk Files |
| Chapter 6 | - | Protecting High-Risk Registry Entries |
| Chapter 7 | - | Tightening Services |
| Chapter 8 | - | Using IPSec |
| Part III - Application Security |
| Chapter 9 | - | Stopping Unauthorized Execution |
| Chapter 10 | - | Securing Internet Explorer |
| Chapter 11 | - | Protecting E-Mail |
| Chapter 12 | - | IIS Security |
| Chapter 13 | - | Using Encrypting File System |
| Part IV - Automating Security |
| Chapter 14 | - | Group Policy Explained |
| Chapter 15 | - | Designing a Secure Active Directory Infrastructure |
| Index |
| List of Sidebars |