|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_ocn905919367 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
150316t20152015enka o 001 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d OCLCO
|d N$T
|d TEFOD
|d OCLCF
|d TEFOD
|d OCLCQ
|d OCLCO
|d AZK
|d OCLCQ
|d CNNOR
|d D6H
|d OCLCQ
|d STF
|d OCLCA
|d OCLCQ
|d OCLCO
|d G3B
|d VT2
|d RDF
|d OCLCO
|d OCLCQ
|d QGK
|
019 |
|
|
|a 961594438
|a 1259219285
|
020 |
|
|
|a 9781784390259
|q (electronic bk.)
|
020 |
|
|
|a 1784390259
|q (electronic bk.)
|
020 |
|
|
|z 9781784398729
|
029 |
1 |
|
|a AU@
|b 000056694060
|
029 |
1 |
|
|a CHNEW
|b 000705565
|
029 |
1 |
|
|a DEBBG
|b BV042622550
|
035 |
|
|
|a (OCoLC)905919367
|z (OCoLC)961594438
|z (OCoLC)1259219285
|
037 |
|
|
|a 2C7DCE72-F3D5-464B-B059-790D40A24DDB
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.76.O63
|b .S583 2015eb
|
072 |
|
7 |
|a COM
|x 088020
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 046060
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 046050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 046020
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 046040
|2 bisacsh
|
082 |
0 |
4 |
|a 005.4469
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sivarajan, Santhosh,
|e author.
|
245 |
1 |
0 |
|a Getting started with windows server security :
|b develop and implement a secure microsoft infrastructure platform using native and built-in tools /
|c Santhosh Sivarajan ; commissioning editor Kunal Parikh ; acquisition editor Rebecca Youe ; copy editors Shivangi Chaturvedi, Adithi Shetty.
|
264 |
|
1 |
|a Birmingham, England ;
|a Mumbai [India] :
|b Packt Publishing,
|c 2015.
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (240 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
0 |
|
|a Professional Expertise Distilled
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ebrary, viewed March 14, 2015).
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Operating System and Baseline Security; Microsoft Windows Server; Baseline and security; Security Configuration Wizard; Translating your policy into a technical policy; Creating a policy template; Policy review and validation; Policy implementation; Analyzing the result and troubleshooting; A backup or rollback plan; Summary; Chapter 2: Native MS Security Tools and Configuration; Microsoft SCM; Installing Microsoft SCM; Administering Microsoft SCM
|
505 |
8 |
|
|a Creating and implementing security policiesExporting GPO from Active Directory; Importing GPO into SCM; Merging imported GPO with the SCM baseline policy; Exporting the SCM baseline policy; Importing a policy into Active Directory; Maintaining and monitoring the integrity of a baseline policy; Microsoft ASA; Application control and management; AppLocker; Creating a policy; Auditing a policy; Implementing the policy; AppLocker and PowerShell; Summary; Chapter 3: Server Roles and Protocols; Server types and roles; Managing servers using Server Manager; Monitoring and securing server roles
|
505 |
8 |
|
|a Creating a server role baseline reportAnalyzing production servers; Server Message Block; Configuring and implementing SMB; Identifying the client and server operating system; Verifying the current SMB configuration; Enabling or disabling the SMB encryption; Verifying SMB communication; Summary; Chapter 4: Application Security; File or data server; Applying baseline security; The access mechanism; Data protection; Removing unwanted shares; Data encryption using BitLocker encryption; Encrypting data volume; Managing BitLocker volume; Print server; Applying baseline security
|
505 |
8 |
|
|a The print server role securityPrint server access mechanisms; The printer driver security and installation; Print server and share permissions; Hyper-V servers; Applying baseline security; Securing the access mechanism; Guard protection; Enabling the guard protection; Encrypting Hyper-V host servers; Internet Information Services; Applying baseline security; Securing web server components; Securing the access mechanisms; Adding dynamic IP restrictions; Summary; Chapter 5: Network Service Security; Baseline policies; Installing RODCs; Configuring RODCs; Domain Name System
|
505 |
8 |
|
|a Applying a DNS baseline policyEnabling Scavenging on a DNS server; Enabling Scavenging on a DNS zone; Securing DNS dynamic updates; Cache poisoning attacks; Dynamic Host Configuration Protocol; Applying a DHCP baseline policy; Controlling and segregating IP address allocation; Configuring PBA; Securing DHCP administration; IP address and DNS management and monitoring; Service accounts; Group Managed Service Accounts; Creating a KDS root key; Creating Group Managed Service Accounts; Installing Group Managed Service Accounts; Configuring Group Managed Service Accounts
|
520 |
|
|
|a If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a Microsoft Windows (Computer file)
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 fast
|0 (OCoLC)fst01367862
|
650 |
|
0 |
|a Virtual computer systems.
|
650 |
|
0 |
|a Data recovery (Computer science)
|
650 |
|
6 |
|a Systèmes virtuels (Informatique)
|
650 |
|
6 |
|a Récupération des données (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x System Administration
|x Windows Administration.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x DOS.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x Windows Server & NT.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x Macintosh.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x Windows Workstation.
|2 bisacsh
|
650 |
|
7 |
|a Data recovery (Computer science)
|2 fast
|0 (OCoLC)fst00887974
|
650 |
|
7 |
|a Virtual computer systems.
|2 fast
|0 (OCoLC)fst01167683
|
700 |
1 |
|
|a Parikh, Kunal,
|e editor.
|
700 |
1 |
|
|a Youe, Rebecca,
|e editor.
|
700 |
1 |
|
|a Chaturvedi, Shivangi,
|e editor.
|
700 |
1 |
|
|a Shetty, Adithi,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|a Sivarajan, Santhosh.
|t Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools.
|d Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015
|h iv, 221 pages
|k Professional Expertise Distilled
|z 9781784398729
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=960451
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11026019
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 960451
|
994 |
|
|
|a 92
|b IZTAP
|