Search
Log in
  • Home

  • Categories

  • Audiobooks

  • E-books

  • Magazines

  • For kids

  • Top lists

  • Help

  • Download app

  • Use campaign code

  • Redeem gift card

  • Try free now
  • Log in
  • Language

    🇫🇷 France

    • FR
    • EN

    🇧🇪 Belgique

    • FR
    • EN

    🇩🇰 Danmark

    • DK
    • EN

    🇩🇪 Deutschland

    • DE
    • EN

    🇪🇸 España

    • ES
    • EN

    🇳🇱 Nederland

    • NL
    • EN

    🇳🇴 Norge

    • NO
    • EN

    🇦🇹 Österreich

    • AT
    • EN

    🇨🇭 Schweiz

    • DE
    • EN

    🇫🇮 Suomi

    • FI
    • EN

    🇸🇪 Sverige

    • SE
    • EN
  1. Books
  2. Nonfiction
  3. Computer sciences

Read and listen for free for 14 days!

Cancel anytime

Try free now
0.0(0)

NTLM Protocols and Security : Definitive Reference for Developers and Engineers

"NTLM Protocols and Security"

"NTLM Protocols and Security" is an authoritative guide that offers a comprehensive exploration of the NTLM authentication protocol, its historical roots, and its continued relevance within modern network environments. The book begins by grounding the reader in the fundamentals of NTLM, including its origin in the evolution of Windows authentication, its architectural components, and its technical specification. Through in-depth analysis, readers gain a nuanced understanding of how NTLM compares to other authentication protocols such as Kerberos, as well as insights into common use cases and the typical lifecycle of NTLM authentication exchanges.

A significant portion of the book delves into the intricate mechanics of the NTLM protocol, encompassing message flows, cryptographic primitives, and session security mechanisms. Detailed examinations of challenge-response workflows, message structures, and cryptographic constructs such as LM/NT hashes, DES, and HMAC-MD5 reveal both the strengths and lingering weaknesses of the protocol. The text also provides practical guidance on the integration of NTLM in a range of environments—including Windows, Samba, and cross-platform scenarios—while discussing the challenges associated with supporting legacy systems and deprecated cryptography.

The security landscape surrounding NTLM is rigorously addressed, with chapters dedicated to the analysis of attack vectors such as pass-the-hash, relay, and man-in-the-middle exploits, as well as nuanced discussions on policy enforcement, hardening techniques, and incident response. The book culminates with forward-looking guidance on enterprise management, deprecation roadmaps, and the transition to modern authentication standards, positioning readers to navigate NTLM’s role in today’s hybrid infrastructures and to strategize for a secure, passwordless future.


Author:

  • Richard Johnson

Format:

  • E-book

Duration:

  • 226 pages

Language:

English

Categories:

  • Nonfiction
  • Computer sciences

More by Richard Johnson

Skip the list
  1. Postman for API Testing and Automation : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  2. Choreography Patterns in Distributed Systems : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  3. Mithril in Practice : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  4. Comprehensive Guide to Meteor Development : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  5. Clarion Essentials : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  6. Redwood Framework Essentials : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  7. ExpressRoute Configuration and Deployment Guide : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  8. PKCS#11 Applications and Implementation : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  9. Essential Avro : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  10. Efficient Workload Management with SGE : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  11. System Hardening for Secure Operations : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  12. Proxmox Administration Essentials : Definitive Reference for Developers and Engineers

    Richard Johnson

    book

Help and contact


About us

  • Our story
  • Career
  • Press
  • Accessibility
  • Nextory One
  • Partner with us
  • Investor relations
  • Instagram
  • Facebook

Explore

  • Categories
  • Audiobooks
  • E-books
  • Magazines
  • For kids
  • Top lists

Popular categories

  • Crime
  • Biographies and reportage
  • Fiction
  • Feel-good and romance
  • Personal development
  • Children's books
  • True stories
  • Sleep and relaxation

Nextory

Copyright © 2025 Nextory AB

Privacy Policy · Terms · Legal notices ·
Excellent4.3 out of 5