Windows Security Internals A Deep Dive into Windows Authentication, Authorization, and Auditing

booksz

U P L O A D E R
9a5bd66e52dc6dbadd22722a4dd0c02a.webp

Free Download Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing by James Forshaw
English | April 30, 2024 | ISBN: 1718501986 | 608 pages | AZW3 | 16 Mb
Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulnerability examples from Google Project Zero's most renowned researcher!

Learn core components of the system in greater depth than ever before, and gain hands-on experience probing advanced Microsoft security systems with the added benefit of PowerShell scripts.
Windows Security Internals is a must-have for anyone needing to understand the Windows operating system's low-level implementations, whether to discover new vulnerabilities or protect against known ones. Developers, devops, and security researchers will all find unparalleled insight into the operating system's key elements and weaknesses, surpassing even Microsoft's official documentation.
Author James Forshaw teaches through meticulously crafted PowerShell examples that can be experimented with and modified, covering everything from basic resource security analysis to advanced techniques like using network authentication. The examples will help you actively test and manipulate system behaviors, learn how Windows secures files and the registry, re-create from scratch how the system grants access to a resource, learn how Windows implements authentication both locally and over a network, and much more.
You'll also explore a wide range of topics, such as:
Windows security architecture, including both the kernel and user-mode applicationsThe Windows Security Reference Monitor (SRM), including access tokens, querying and setting a resource's security descriptor, and access checking and auditingInteractive Windows authentication and credential storage in the Security Account Manager (SAM) and Active DirectoryMechanisms of network authentication protocols, including NTLM and KerberosIn an era of sophisticated cyberattacks on Windows networks, mastering the operating system's complex security mechanisms is more crucial than ever. Whether you're defending against the latest cyber threats or delving into the intricacies of Windows security architecture, you'll find Windows Security Internals indispensable in your efforts to navigate the complexities of today's cybersecurity landscape.


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Links are Interchangeable - Single Extraction
 
Kommentar
541637676_oip.jpg

1.48 GB | 00:24:17 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English


Files Included :
01 course-introduction-introduction-to-security-and-authentication.mp4 (10.32 MB)
02 instructor-introduction.mp4 (15.05 MB)
04 the-whats-what-of-the-course.mp4 (18.09 MB)
05 completing-the-guided-labs.mp4 (10.74 MB)
08 introducing-the-ai-tool-microsoft-copilot.mp4 (17.67 MB)
09 how-to-be-successful-in-this-program.mp4 (26.5 MB)
10 introduction-to-the-project.mp4 (26.48 MB)
01 introduction-securing-apis-with-asp-net-identity.mp4 (8.59 MB)
02 overview-of-asp-net-identity.mp4 (29.14 MB)
03 architecture-of-asp-net-identity.mp4 (21.75 MB)
01 user-registration-process.mp4 (14.48 MB)
03 user-authentication-process.mp4 (17.07 MB)
04 implementing-user-registration-and-authentication.mp4 (8.17 MB)
01 introduction-to-user-roles-in-asp-net-identity.mp4 (19.86 MB)
03 claims-based-authorization-in-asp-net-identity.mp4 (28.47 MB)
05 demonstrating-roles-and-claims-in-an-asp-net-application.mp4 (114.09 MB)
06 managing-roles-and-claims-in-an-asp-net-application.mp4 (14.83 MB)
01 overview-of-token-based-authentication.mp4 (29.98 MB)
02 demonstrating-token-based-authentication-in-asp-net.mp4 (33.36 MB)
03 implementing-token-based-authentication-in-an-asp-net-application.mp4 (14.58 MB)
01 overview-of-external-authentication-providers.mp4 (23.78 MB)
02 demonstrating-integration-of-external-providers.mp4 (41.25 MB)
03 integrating-external-authentication-providers.mp4 (12.8 MB)
06 conclusion-securing-apis-with-asp-net-identity.mp4 (7.8 MB)
01 introduction-role-based-access-control-and-jwt-authentication.mp4 (11.52 MB)
02 overview-of-role-based-access-control-rbac.mp4 (29.71 MB)
01 what-are-json-web-tokens-jwts.mp4 (32.77 MB)
03 creating-and-decoding-jwts.mp4 (18.46 MB)
04 creating-and-decoding-jwts.mp4 (16.33 MB)
01 overview-of-jwt-authentication-in-asp-net-core.mp4 (24.69 MB)
02 implementing-jwt-authentication.mp4 (35.11 MB)
03 implementing-jwt-authentication-in-asp-net.mp4 (13.07 MB)
01 securing-api-endpoints-with-jwts.mp4 (24.67 MB)
03 securing-api-endpoints-with-jwts.mp4 (26.02 MB)
04 guided-lab-video-securing-api-endpoints-with-jwts.mp4 (10.15 MB)
01 best-practices-for-jwt-authentication.mp4 (31.4 MB)
02 implementing-security-best-practices-for-jwts.mp4 (67.4 MB)
03 guided-lab-video-applying-jwt-security-best-practices.mp4 (13.52 MB)
05 conclusion-role-based-access-control-and-jwt-authentication.mp4 (9.29 MB)
01 introduction-data-protection.mp4 (10.7 MB)
02 core-principles-of-data-protection.mp4 (26.95 MB)
03 threats-to-data-protection.mp4 (24.75 MB)
01 what-is-encryption.mp4 (31.23 MB)
02 implementing-encryption-and-decryption.mp4 (33.04 MB)
03 guided-lab-video-implementing-encryption-and-decryption.mp4 (12.47 MB)
01 what-is-data-masking.mp4 (19.65 MB)
02 what-is-data-obfuscation.mp4 (22.73 MB)
01 best-practices-for-secure-data-storage.mp4 (17.29 MB)
02 implementing-secure-data-storage.mp4 (51.8 MB)
03 guided-lab-video-implementing-secure-data-storage.mp4 (22.25 MB)
01 encryption-protocols-for-data-in-transit.mp4 (31.02 MB)
02 methods-for-securing-network-data.mp4 (19.43 MB)
04 conclusion-data-protection.mp4 (8.5 MB)
01 introduction-using-microsoft-copilot-for-implementing-security-features.mp4 (9.5 MB)
02 introduction-to-writing-secure-code.mp4 (24.55 MB)
03 using-microsoft-copilot-to-write-secure-code.mp4 (46.33 MB)
01 overview-of-authentication-and-authorization.mp4 (21.58 MB)
02 implementing-authentication-and-authorization-with-microsoft-copilot.mp4 (57.02 MB)
01 identifying-security-issues-in-code.mp4 (21.91 MB)
02 using-microsoft-copilot-to-debug-security-issues.mp4 (62.44 MB)
01 course-conclusion-security-and-authentication.mp4 (13.05 MB)
]
Screenshot
FGDP1RjQ_o.jpg

1LdiCrwX_o.jpg

kUYoxowv_o.jpg

7jDHILs8_o.jpg

1gvsb5Hq_o.jpg

LAxZBLlu_o.jpg

Vbj6zkQa_o.jpg

EGO5Q631_o.jpg

l3iZSHLb_o.jpg

VSRSc5Re_o.jpg

GNOWFzWb_o.jpg

XbWD3Fz0_o.jpg

H6gWuiWT_o.jpg

loCc0Yio_o.jpg

Db8MIXtf_o.jpg

ATS5UuJw_o.jpg

eRMvQwSd_o.jpg

Lzk5mgoe_o.jpg

L1Q5XD2h_o.jpg

X0viuxuO_o.jpg

Y9sBk9Oe_o.jpg

r2b6uCHi_o.jpg

zErIzE5v_o.jpg

SHv15Bl2_o.jpg

0iZOifsr_o.jpg

VUPhOKcb_o.jpg

0qWvfGVZ_o.jpg

cM4pMfil_o.jpg

EIbpGJRR_o.jpg

Y8X5tjoJ_o.jpg

hz3yL9c6_o.jpg

6cZaSiW4_o.jpg

u7PFKsGo_o.jpg

nRXJhcK8_o.jpg

2Yw4iYeo_o.jpg

hcXAUUY6_o.jpg

XmTBh9uZ_o.jpg

E1SIzYTn_o.jpg

GAQ3leNi_o.jpg



Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten