Cargando…

Learning Microsoft Windows Server 2012 Dynamic Access Control.

This practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control. If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynam...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Nickel, Jochen
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2013.
Colección:Professional expertise distilled
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn867820956
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 140110s2013 enka o 001 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d EBLCP  |d E7B  |d MHW  |d OCLCQ  |d VT2  |d OCLCO  |d DEBSZ  |d CHVBK  |d OCLCQ  |d COO  |d OCLCF  |d OCLCQ  |d FEM  |d COCUF  |d CNNOR  |d MOR  |d CCO  |d PIFAG  |d N$T  |d OCLCO  |d ZCU  |d AGLDB  |d MERUC  |d OCLCQ  |d OCLCO  |d U3W  |d D6H  |d OCL  |d STF  |d VTS  |d NRAMU  |d ICG  |d NLE  |d INT  |d OCLCA  |d UKMGB  |d OCLCQ  |d OCLCO  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d OCLCO  |d DKC  |d OCLCQ  |d UKAHL  |d HS0  |d OCLCQ  |d AJS  |d OCLCO  |d QGK  |d OCLCQ  |d OCLCO 
016 7 |a 018006394  |2 Uk 
019 |a 961591469  |a 962708033  |a 968055760  |a 969046716  |a 1259078965 
020 |a 1306280249  |q (electronic bk.) 
020 |a 9781306280242  |q (electronic bk.) 
020 |a 9781782178194  |q (electronic bk.) 
020 |a 1782178198  |q (electronic bk.) 
020 |z 9781782178187 
020 |z 178217818X 
029 1 |a AU@  |b 000055942309 
029 1 |a CHNEW  |b 000643076 
029 1 |a CHNEW  |b 000899884 
029 1 |a CHVBK  |b 403397480 
029 1 |a DEBBG  |b BV044065978 
029 1 |a DEBSZ  |b 40556886X 
029 1 |a DEBSZ  |b 493136185 
029 1 |a DKDLA  |b 820120-katalog:999943369905765 
029 1 |a NZ1  |b 15912144 
029 1 |a UKMGB  |b 018006394 
035 |a (OCoLC)867820956  |z (OCoLC)961591469  |z (OCoLC)962708033  |z (OCoLC)968055760  |z (OCoLC)969046716  |z (OCoLC)1259078965 
037 |a 559275  |b MIL 
050 4 |a QA76.9.C55  |b .N53 2013eb 
050 4 |a QA76.774.M55 
072 7 |a COM  |x 046050  |2 bisacsh 
082 0 4 |a 005.4476  |2 23 
049 |a UAMI 
100 1 |a Nickel, Jochen. 
245 1 0 |a Learning Microsoft Windows Server 2012 Dynamic Access Control. 
260 |a Birmingham :  |b Packt Publishing,  |c 2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 0 |a Professional expertise distilled 
520 |a This practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control. If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynamic Access Control in your organization, or have already implemented it and want to discover more about the abilities and how to use them effectively, this book will be an essential resource. You should have some understanding of security solutions, Active Directory, Access Privileges/ Rights and Auth. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed July 8, 2017). 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims 
505 8 |a Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements 
505 8 |a Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies 
505 8 |a Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR -- a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services 
505 8 |a Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD -- using Dynamic Access Control; Summary; Chapter 8: Automating the Solution 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a Microsoft Windows server  |x Access control. 
630 0 0 |a Microsoft Windows server  |x Security measures. 
630 0 0 |a Microsoft Windows (Computer file) 
630 0 7 |a Microsoft Windows (Computer file)  |2 fast 
630 0 7 |a Microsoft Windows server  |2 fast 
650 0 |a Client/server computing  |x Access control. 
650 0 |a Client/server computing. 
650 6 |a Architecture client-serveur (Informatique)  |x Accès  |x Contrôle. 
650 6 |a Architecture client-serveur (Informatique) 
650 7 |a COMPUTERS  |x Operating Systems  |x Windows Server.  |2 bisacsh 
650 7 |a Client/server computing  |2 fast 
650 7 |a Security systems  |2 fast 
776 0 8 |i Print version:  |z 9781306280242 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=680710  |z Texto completo 
936 |a BATCHLOAD 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26849746 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1593860 
938 |a ebrary  |b EBRY  |n ebr10825558 
938 |a EBSCOhost  |b EBSC  |n 680710 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis27260898 
994 |a 92  |b IZTAP