|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn867820956 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
140110s2013 enka o 001 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d EBLCP
|d E7B
|d MHW
|d OCLCQ
|d VT2
|d OCLCO
|d DEBSZ
|d CHVBK
|d OCLCQ
|d COO
|d OCLCF
|d OCLCQ
|d FEM
|d COCUF
|d CNNOR
|d MOR
|d CCO
|d PIFAG
|d N$T
|d OCLCO
|d ZCU
|d AGLDB
|d MERUC
|d OCLCQ
|d OCLCO
|d U3W
|d D6H
|d OCL
|d STF
|d VTS
|d NRAMU
|d ICG
|d NLE
|d INT
|d OCLCA
|d UKMGB
|d OCLCQ
|d OCLCO
|d WYU
|d G3B
|d TKN
|d OCLCQ
|d OCLCO
|d DKC
|d OCLCQ
|d UKAHL
|d HS0
|d OCLCQ
|d AJS
|d OCLCO
|d QGK
|d OCLCQ
|d OCLCO
|
016 |
7 |
|
|a 018006394
|2 Uk
|
019 |
|
|
|a 961591469
|a 962708033
|a 968055760
|a 969046716
|a 1259078965
|
020 |
|
|
|a 1306280249
|q (electronic bk.)
|
020 |
|
|
|a 9781306280242
|q (electronic bk.)
|
020 |
|
|
|a 9781782178194
|q (electronic bk.)
|
020 |
|
|
|a 1782178198
|q (electronic bk.)
|
020 |
|
|
|z 9781782178187
|
020 |
|
|
|z 178217818X
|
029 |
1 |
|
|a AU@
|b 000055942309
|
029 |
1 |
|
|a CHNEW
|b 000643076
|
029 |
1 |
|
|a CHNEW
|b 000899884
|
029 |
1 |
|
|a CHVBK
|b 403397480
|
029 |
1 |
|
|a DEBBG
|b BV044065978
|
029 |
1 |
|
|a DEBSZ
|b 40556886X
|
029 |
1 |
|
|a DEBSZ
|b 493136185
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999943369905765
|
029 |
1 |
|
|a NZ1
|b 15912144
|
029 |
1 |
|
|a UKMGB
|b 018006394
|
035 |
|
|
|a (OCoLC)867820956
|z (OCoLC)961591469
|z (OCoLC)962708033
|z (OCoLC)968055760
|z (OCoLC)969046716
|z (OCoLC)1259078965
|
037 |
|
|
|a 559275
|b MIL
|
050 |
|
4 |
|a QA76.9.C55
|b .N53 2013eb
|
050 |
|
4 |
|a QA76.774.M55
|
072 |
|
7 |
|a COM
|x 046050
|2 bisacsh
|
082 |
0 |
4 |
|a 005.4476
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Nickel, Jochen.
|
245 |
1 |
0 |
|a Learning Microsoft Windows Server 2012 Dynamic Access Control.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2013.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
0 |
|
|a Professional expertise distilled
|
520 |
|
|
|a This practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control. If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynamic Access Control in your organization, or have already implemented it and want to discover more about the abilities and how to use them effectively, this book will be an essential resource. You should have some understanding of security solutions, Active Directory, Access Privileges/ Rights and Auth.
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed July 8, 2017).
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims
|
505 |
8 |
|
|a Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements
|
505 |
8 |
|
|a Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies
|
505 |
8 |
|
|a Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR -- a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services
|
505 |
8 |
|
|a Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD -- using Dynamic Access Control; Summary; Chapter 8: Automating the Solution
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a Microsoft Windows server
|x Access control.
|
630 |
0 |
0 |
|a Microsoft Windows server
|x Security measures.
|
630 |
0 |
0 |
|a Microsoft Windows (Computer file)
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 fast
|
630 |
0 |
7 |
|a Microsoft Windows server
|2 fast
|
650 |
|
0 |
|a Client/server computing
|x Access control.
|
650 |
|
0 |
|a Client/server computing.
|
650 |
|
6 |
|a Architecture client-serveur (Informatique)
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Architecture client-serveur (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x Windows Server.
|2 bisacsh
|
650 |
|
7 |
|a Client/server computing
|2 fast
|
650 |
|
7 |
|a Security systems
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 9781306280242
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=680710
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26849746
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1593860
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10825558
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 680710
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis27260898
|
994 |
|
|
|a 92
|b IZTAP
|