Search
Log in
  • Home

  • Categories

  • Audiobooks

  • E-books

  • For kids

  • Top lists

  • Help

  • Download app

  • Use campaign code

  • Redeem gift card

  • Try free now
  • Log in
  • Language

    🇩🇰 Danmark

    • DK
    • EN

    🇧🇪 Belgique

    • FR
    • EN

    🇩🇪 Deutschland

    • DE
    • EN

    🇪🇸 España

    • ES
    • EN

    🇫🇷 France

    • FR
    • EN

    🇳🇱 Nederland

    • NL
    • EN

    🇳🇴 Norge

    • NO
    • EN

    🇦🇹 Österreich

    • AT
    • EN

    🇨🇭 Schweiz

    • DE
    • EN

    🇫🇮 Suomi

    • FI
    • EN

    🇸🇪 Sverige

    • SE
    • EN
  1. Books
  2. Nonfiction
  3. Computer sciences

Read and listen for free for 42 days!

Cancel anytime

Try free now
0.0(0)

NTLM Protocols and Security : Definitive Reference for Developers and Engineers

"NTLM Protocols and Security"

"NTLM Protocols and Security" is an authoritative guide that offers a comprehensive exploration of the NTLM authentication protocol, its historical roots, and its continued relevance within modern network environments. The book begins by grounding the reader in the fundamentals of NTLM, including its origin in the evolution of Windows authentication, its architectural components, and its technical specification. Through in-depth analysis, readers gain a nuanced understanding of how NTLM compares to other authentication protocols such as Kerberos, as well as insights into common use cases and the typical lifecycle of NTLM authentication exchanges.

A significant portion of the book delves into the intricate mechanics of the NTLM protocol, encompassing message flows, cryptographic primitives, and session security mechanisms. Detailed examinations of challenge-response workflows, message structures, and cryptographic constructs such as LM/NT hashes, DES, and HMAC-MD5 reveal both the strengths and lingering weaknesses of the protocol. The text also provides practical guidance on the integration of NTLM in a range of environments—including Windows, Samba, and cross-platform scenarios—while discussing the challenges associated with supporting legacy systems and deprecated cryptography.

The security landscape surrounding NTLM is rigorously addressed, with chapters dedicated to the analysis of attack vectors such as pass-the-hash, relay, and man-in-the-middle exploits, as well as nuanced discussions on policy enforcement, hardening techniques, and incident response. The book culminates with forward-looking guidance on enterprise management, deprecation roadmaps, and the transition to modern authentication standards, positioning readers to navigate NTLM’s role in today’s hybrid infrastructures and to strategize for a secure, passwordless future.


Author:

  • Richard Johnson

Format:

  • E-book

Duration:

  • 226 pages

Language:

English

Categories:

  • Nonfiction
  • Computer sciences

More by Richard Johnson

Skip the list
  1. Efficient Editing with Vim : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  2. The Most Beloved Bedtime Stories for kids : 30 Aesop’s Fables for Children, Little Red Riding Hood, Snow White, Rapunzel, Beauty and the Beast, Hensel & Gretel, Cinderella, Little Mermaid and Many More

    Melanie Rose, Aesop, Charles Perrault, Hans Christian Andersen, Richard Johnson, The Brothers Grimm

    audiobook
  3. Comprehensive Guide to Java Swing : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  4. Mithril in Practice : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  5. Comprehensive Guide to Meteor Development : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  6. Comprehensive Guide to Burp Suite : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  7. NSwag for Efficient API Development : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  8. Moleculer for Scalable Microservices : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  9. Effective Error Monitoring with Bugsnag : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  10. Eclipse IDE Essentials : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  11. FCIP Protocols and Implementation : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  12. CloudFormation Essentials : Definitive Reference for Developers and Engineers

    Richard Johnson

    book

Help and contact


About us

  • Our story
  • Career
  • Press
  • Accessibility
  • Partner with us
  • Investor relations
  • Instagram
  • Facebook

Explore

  • Categories
  • Audiobooks
  • E-books
  • Magazines
  • For kids
  • Top lists

Popular categories

  • Crime
  • Biographies and reportage
  • Fiction
  • Feel-good and romance
  • Personal development
  • Children's books
  • True stories
  • Sleep and relaxation

Nextory

Copyright © 2025 Nextory AB

Privacy Policy · Terms ·
Excellent4.3 out of 5