Reveals how to protect one's network from potential security threats that might enter via such endpoints as employee laptops, PDAs, and other end-user devices, explaining how to identify the products, tools, and processes required to secure endpoint devices; how to configure them securely; how to identify and remediate a compromised device; and how to protect a network from the growing number of endpoint viruses and malware. Original. (Advanced)Next, wea#39;re going to disable the good Doctor Watson. Dr. Watson is an automatic debugger that collects information and sends it back to Microsoft when applications crash. A knowledgeable hacker could exploit the Doctor, so wea#39;re going toanbsp;...
|Publisher||:||Addison-Wesley Professional - 2007|