Microsoft® Encyclopedia of Security

Microsoft® Encyclopedia of Security
Published:June 18, 2003Language:English
Author:Mitch TullochTechnology:Microsoft Office XP
Length:480 PagesISBN 13:9780735618770

List Price:

$ 39.99
About The BookThe essential security reference for computer professionals at all levels.

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The MICROSOFT ENCYCLOPEDIA OF SECURITY delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources and types of attacks, countermeasures, policies, and more. You get clear, concise explanations and case scenarios that deftly take you from concept to real-world application—ready answers to help maximize security for your mission-critical systems and data.

  • Know your vulnerabilities—understand the ways black-hat attackers footprint and enumerate systems, exploit security holes, crack passwords, elevate privileges, and cover their tracks.

  • Deploy your best defense—review fundamental concepts of intrusion detection systems, encryption technologies, virus protection, and computer forensics.

  • Stay one step ahead—keep pace with emerging security technologies, such as Wi-Fi Protected Access and XML Encryption; recent government legislation; and the latest industry trends.

  • Decipher security acronyms—from AES to XMLDSIG and 3DES to 802.11i, decode essential terms.

  • Build your own network of resources—from professional associations and standards organizations to online communities and links to free information, know how to stay current.

  • Get an edge in certification preparation—ideal reference for anyone pursuing Security+, MCSE, CISSP, GIAC, and other professional certifications.

  • Entries include:
    Advanced Encryption Standard
  • backdoors
  • cookie poisoning
  • digital rights management
  • dynamic packet filtering
  • E-SIGN Act
  • file slack
  • hacking
  • honeypots
  • ICMP tunneling
  • IPSec
  • John the Ripper
  • keystroke logging
  • L2TP
  • L0phtCrack
  • managed security service providers
  • message digests
  • NIAP
  • Nmap
  • Qchain
  • one-time passwords
  • password cracking
  • PKI
  • port scanning
  • privacy
  • reverse Telnet
  • Safe Harbor Agreement
  • spoofing
  • Tcp_wrapper
  • Trin00
  • UDP scanning
  • viruses
  • wardriving
  • Windows® cryptographic API
  • XML signatures
  • Web services security
  • worms
  • zombie zapper
  • and more
  • About Mitch TullochMitch Tulloch, MVP, is President of MTIT Enterprises, an IT content development company based in Winnipeg, Canada. Prior to starting his own company in 1998, Mitch worked as a Microsoft Certified Trainer (MCT) for Productivity Point International. Mitch is a widely recognized expert on Windows administration, networking and security and has been repeatedly awarded Most Valuable Professional (MVP) status by Microsoft for his outstanding contributions in supporting users who deploy Microsoft platforms, products and solutions. Mitch is the author of over a dozen books including the Microsoft Encyclopedia of Networking and the Microsoft Encyclopedia of Security, and he has written over a hundred articles on the topics of Windows administration, networking, and security. He is a regular columnist on and, contributes weekly editorials for IT World's Windows in the Enterprise newsletter, and writes for other popular sites including and Windows XP Expert Zone. Mitch has also written feature articles for industry magazines such as NetworkWorld, BizTech Magazine, and Microsoft Certified Professional Magazine, and his articles have been widely syndicated on sites ranging ComputerWorld to CNN. Mitch is also a professor at Jones International University (JIU) where he teaches graduate-level courses in Information Security Management (ISM) that he developed together with his wife Ingrid for the Masters of Business Administration (MBA) program at JIU. For more information about Mitch and his writing activities, see
    Other Books By Mitch Tulloch
    Looking for training resources, events and advice from peers? Join the Microsoft Training and Certification Community. Preparing for an exam now? Find your Microsoft Certification Study Group. Talk to us on these social networks:
    What do you think of this book?Your feedback is important in helping us create books that serve your needs and meet your expectations. Please take our survey at

    Note: You will need this book's 13-digit International Standard Book Number (ISBN) to take the survey. The ISBN 13 can be found above.
    To report or search for corrections in this book or companion content,
    please go to