Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 197 of 214
Previous Record Next Record
E-Book/E-Doc
Author Shinder, Thomas W.

Title Windows server 2012 security from end to edge and beyond : architecting, designing, planning, and deploying Windows server 2012 security solutions / Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder.

Imprint Amsterdam : Elsevier, 2013.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Bibliography Includes bibliographical references and index.
Summary Windows 8 Security from End to Edge and Beyond shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access. Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows security technologies and how you can deploy them effectively in both the traditional datacenter and in new cloud-based solutions. When you finish the book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features first in a Test Lab and then in pilot and production environments. Windows 8 Security introduces the revolutionary "Test Lab Guide" approach to hands-on experiences with the security technologies discussed in the book. This approach enables you to test every subject covered in the book in a predefined Test Lab Environment. The combination of Test Lab experience with conceptual and deployment guidance enables you to understand the technologies in record time and move from Test Lab to production faster than ever before. Critical material is presented in a number of ways, including key concepts, scenario-based approaches to evaluation, planning, deployment and management, as well as the Test Lab Guides. You can also download video that illustrates the functionality in the Test Lab from the authors' blog http://blogs.technet.com.b.security_talk/. In addition, each chapter wraps up with an "Administrators Punch List," a bullet list summary of key concepts discussed in the chapter. Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8. Test Lab Guides enable you to test everything before deploying live to your system
Note Print version record.
Contents Front Cover; Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server ... ; Copyright; Contents; Acknowledgments; About the Authors; About the Technical Editor; Foreword; Chapter 1: Planning Platform Security; Reviewing the Core Security Principles; Planning a Secure Platform from End to Edge and Beyond; Understanding Business Requirements; Perform Risk Analysis; Review Policies, Procedures, Standards, and Guidelines; Security Awareness Training; Determine Access Control; Secure Software Development Strategy; Network Security.
Operating System SecurityFrom End to Edge and Beyond Chapter Previews; Chapter 1-Planning Platform Security; Chapter 2 -Planning Server Role in Windows 8; Chapter 3 -Deploying Directory Services and Certificate Services; Chapter 4 -Deploying AD FS and AD RMS in Windows Server 2012; Chapter 5 -Patch Management with Windows Server 2012; Chapter 6 -Virtualization Security; Chapter 7 -Controlling Access to your Environment with Authentication and Authorization; Chapter 8 -Endpoint Security; Chapter 9 -Secure Client Deployment with Trusted Boot and BitLocker.
Chapter 10 -Mitigating Application's VulnerabilitiesChapter 11 -Mitigating Network Vulnerabilities; Chapter 12 -Unified Remote Access and BranchCache; Chapter 13 -DirectAccess Deployment Scenarios; Chapter 14 -Protecting Legacy Remote Clients; Chapter 15 -Cloud Security; Summary; Chapter 2:Planning Server Role in Windows Server 2012; Server Role and Security Considerations; Using Security Configuration Wizard to Harden the Server; Using Server Manager to Add a New Role or Feature; Using Security Compliance Manager to Hardening Servers; Planning Before Hardening Your Server with SCM.
Staying Up to Date with SCMAdministrator's Punch List; Summary; Chapter 3:Deploying Directory Services and Certificate Services; Evolving Threats Against Certificates; Implementing Directory Services on Windows Server 2012; Installing the Active Directory Domain Services Role; Creating a New Forest with the Windows Server 2012 Server Manager; Implementing Certificate Services on Windows Server 2012; Planning AD CS Implementation; Certificate Authority (CA); Web Enrollment; Online Certificate Status Protocol Responder (OCSP); Network Device Enrollment Service (NDES).
Certificate Enrollment Policy Web Server (CEP) and Certificate Enrollment Policy Web Services (CES)Installing AD CS Role; Installing AD CS Using Server Manager; Site-Aware Certificate Enrollment; Configuring CA Site; Renew with the Same Key; Validate Your Knowledge in AD CS; Administrator's Punch List; Summary; Chapter 4:Deploying AD FS and AD RMS in Windows Server 2012; Planning for Active Directory Federation Services; Deploying Active Directory Federation Services; Installing AD FS Role Service Using PowerShell; Installing and Deploying AD FS Using Server Manager.
Subject Microsoft Windows server.
Microsoft Windows server
Operating systems (Computers)
Computer security.
Computer Security
Systèmes d'exploitation (Ordinateurs)
Sécurité informatique.
operating systems.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer security
Operating systems (Computers)
Added Author Diogenes, Yuri.
Shinder, Debra Littlejohn.
Other Form: Print version: Shinder, Thomas W. Windows server 2012 security from end to edge and beyond. Amsterdam : Elsevier, 2013 9781597499804 (DLC) 2013005194 (OCoLC)840927676
ISBN 9781597499811 (electronic bk.)
1597499811 (electronic bk.)
1597492434
9781597492430
9781597499804
1597499803
Standard No. AU@ 000051284779
DEBBG BV042314319
DEBSZ 405348150
NZ1 15193688

 
    
Available items only