BKNT4SHB.RVW 980814 "Windows NT Server 4 Security Handbook", Lee Hadfield/Dave Hatter/Dave Bixler, 1997, 0-7897-1213-X, U$39.99/C$56.95/UK#36.99 %A Lee Hadfield %A Dave Hatter dhatter@definiti.com %A Dave Bixler dbixler@art-deco.net %C 201 W. 103rd Street, Indianapolis, IN 46290 %D 1997 %G 0-7897-1213-X %I Macmillan Computer Publishing (MCP) %O U$39.99/C$56.95/UK#36.99 800-858-7674 info@mcp.com %P 476 p. %T "Windows NT Server 4 Security Handbook" Part one is an overview, both of security and Windows NT. Chapter one's presentation of security basics has many good points, but also some unfortunate gaps and errors. The review of security concepts in NT provides a good grounding in how the matter is seen from Microsoft's perspective in chapter two. (It also has a rather interesting quick introduction to firewalls.) The NT architecture overview in chapter three does not really concentrate on security topics. When it does, the coverage of access control is reasonably clear, if not terribly readable. The Implementation of security, in part two, explains individual functions well but does not provide conceptual frameworks for security operations. Most of the material does provide the ideas behind a feature, but then simply follows through the screens for turning it on. Topics include domains, trust relationships, NTFS (New Technology File System) security, protecting domain resources, and NT Workstation security. Somewhat different is chapter six, which gives a thorough tutorial on internal user authentication procedures. Part three walks through the implementation of a master domain network. Chapters cover planning, implementation steps, and configuration of trust relationships, but the material is too brief for a realistic guide. Part four looks at security for various related products, such as BackOffice, NetWare, Macintosh, Internet, and UNIX. Again, there are more mentions than working details. Part five first explains and then walks you through implementation for C-2 security configuration. Of those I have reviewed to date, this book delves deepest into many areas of NT security and protection. However, it still does not draw back the shroud surrounding the NT security model. The explanations of operations are clear and there is much useful information, but still no clear direction to the besieged sysadmin. copyright Robert M. Slade, 1998 BKNT4SHB.RVW 980814