Search
Log in
  • Home

  • Categories

  • Audiobooks

  • E-books

  • For kids

  • Top lists

  • Help

  • Download app

  • Use campaign code

  • Redeem gift card

  • Try free now
  • Log in
  • Language

    🇩🇪 Deutschland

    • DE
    • EN

    🇧🇪 Belgique

    • FR
    • EN

    🇩🇰 Danmark

    • DK
    • EN

    🇪🇸 España

    • ES
    • EN

    🇫🇷 France

    • FR
    • EN

    🇳🇱 Nederland

    • NL
    • EN

    🇳🇴 Norge

    • NO
    • EN

    🇦🇹 Österreich

    • AT
    • EN

    🇨🇭 Schweiz

    • DE
    • EN

    🇫🇮 Suomi

    • FI
    • EN

    🇸🇪 Sverige

    • SE
    • EN
  1. Books
  2. Nonfiction
  3. Computer sciences

Read and listen for free for 14 days!

Cancel anytime

Try free now
0.0(0)

NTLM Protocols and Security : Definitive Reference for Developers and Engineers

"NTLM Protocols and Security"

"NTLM Protocols and Security" is an authoritative guide that offers a comprehensive exploration of the NTLM authentication protocol, its historical roots, and its continued relevance within modern network environments. The book begins by grounding the reader in the fundamentals of NTLM, including its origin in the evolution of Windows authentication, its architectural components, and its technical specification. Through in-depth analysis, readers gain a nuanced understanding of how NTLM compares to other authentication protocols such as Kerberos, as well as insights into common use cases and the typical lifecycle of NTLM authentication exchanges.

A significant portion of the book delves into the intricate mechanics of the NTLM protocol, encompassing message flows, cryptographic primitives, and session security mechanisms. Detailed examinations of challenge-response workflows, message structures, and cryptographic constructs such as LM/NT hashes, DES, and HMAC-MD5 reveal both the strengths and lingering weaknesses of the protocol. The text also provides practical guidance on the integration of NTLM in a range of environments—including Windows, Samba, and cross-platform scenarios—while discussing the challenges associated with supporting legacy systems and deprecated cryptography.

The security landscape surrounding NTLM is rigorously addressed, with chapters dedicated to the analysis of attack vectors such as pass-the-hash, relay, and man-in-the-middle exploits, as well as nuanced discussions on policy enforcement, hardening techniques, and incident response. The book culminates with forward-looking guidance on enterprise management, deprecation roadmaps, and the transition to modern authentication standards, positioning readers to navigate NTLM’s role in today’s hybrid infrastructures and to strategize for a secure, passwordless future.


Author:

  • Richard Johnson

Format:

  • E-book

Duration:

  • 226 pages

Language:

English

Categories:

  • Nonfiction
  • Computer sciences

More by Richard Johnson

Skip the list
  1. Chaos Theory and Nonlinear Dynamics : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  2. Zabbix Systems Monitoring and Management : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  3. Boost.Asio Techniques and Applications : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  4. Efficient Workload Management with SGE : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  5. Efficient Code Review with Gerrit : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  6. Applied APL Programming : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  7. Applied Statistical Analysis with SPSS : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  8. Avalonia Development Essentials : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  9. Pop!_OS System Administration Guide : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  10. PKCS#11 Applications and Implementation : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  11. Comprehensive Guide to Meteor Development : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  12. Effective Cucumber Automation : Definitive Reference for Developers and Engineers

    Richard Johnson

    book

Help and contact


About us

  • Our story
  • Career
  • Press
  • Accessibility
  • Partner with us
  • Investor relations
  • Instagram
  • Facebook

Explore

  • Categories
  • Audiobooks
  • E-books
  • Magazines
  • For kids
  • Top lists

Popular categories

  • Crime
  • Biographies and reportage
  • Fiction
  • Feel-good and romance
  • Personal development
  • Children's books
  • True stories
  • Sleep and relaxation

Nextory

Copyright © 2025 Nextory AB

Privacy Policy · Terms · Imprint ·
Excellent4.3 out of 5