|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn243693964 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
080813s2008 waua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d WPG
|d NIALS
|d QE2
|d OCLCQ
|d CEF
|d OCLCQ
|d SFB
|d NHM
|d B24X7
|d DEBSZ
|d N$T
|d OCLCQ
|d OCLCF
|d OCLCQ
|d YDXCP
|d OCLCQ
|d UAB
|d AU@
|d VT2
|d CNCEN
|d OCLCQ
|d OCLCO
|d OCLCQ
|d UKAHL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 243616223
|a 776203658
|a 1044194859
|a 1056360870
|a 1103281891
|
020 |
|
|
|a 9780735625167
|
020 |
|
|
|a 0735625166
|
020 |
|
|
|a 9780735647275
|q (electronic bk.)
|
020 |
|
|
|a 0735647275
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000067103416
|
029 |
1 |
|
|a DEBSZ
|b 355425661
|
029 |
1 |
|
|a HEBIS
|b 291497160
|
035 |
|
|
|a (OCoLC)243693964
|z (OCoLC)243616223
|z (OCoLC)776203658
|z (OCoLC)1044194859
|z (OCoLC)1056360870
|z (OCoLC)1103281891
|
037 |
|
|
|a CL0500000025
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .K67 2008eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Komar, Brian.
|
245 |
1 |
0 |
|a Windows Server 2008 PKI and certificate security /
|c Brian Komar.
|
260 |
|
|
|a Redmond, Wash. :
|b Microsoft Press,
|c ©2008.
|
300 |
|
|
|a 1 online resource (xxix, 768 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a pt. I. Foundations of PKI -- 1. Cryptography basics -- 2. Primer to PKI -- 3. Policies and PKI -- pt. II. Establishing a PKI -- 4. Preparing an active director environment -- 5. Designing a certification authority hierarchy -- 6. Implementing a CA hierarchy -- 7. Upgrading your existing Microsoft PKI -- 8. Verifying and monitoring your Microsoft PKI -- 9. Securing a CA hierarchy -- 10. Certificate revocation -- 11. Certificate validation -- 12. Designing certificate templates -- 13. Role separation -- 14. Planning and implementing disaster recovery -- 15. Issuing certificates -- 16. Creating trust between organizations -- pt. III. Deploying application-specific solutions -- 17. Identity Lifecycle Manager 2007 certificate management -- 18. Archiving encryption keys -- 19. Implementing SSL encryption for Web servers -- 20. Encrypting file system -- 21. Deploying smart cards -- 22. Secure e-mail -- 23. Virtual private networking -- 24. Wireless networking -- 25. Document and code signing -- 26. Deploying certificates to domain controllers -- 27. Network device enrollment service -- A. Case study questions and answers.
|
520 |
|
|
|a Get in-depth guidance for designing and implementing certificate-based security solutions--straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication, VPNs, secure email, Web SSL, EFS, and code-signing applications using Windows Server PKI and certificate services. A principal PKI consultant to Microsoft, Brian shows you how to incorporate best practices, avoid common design and implementation mistakes, help minimize risk, and optimize security administration.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Microsoft Windows server.
|
630 |
0 |
7 |
|a Microsoft Windows server.
|2 blmlsh
|
630 |
0 |
7 |
|a Microsoft Windows server
|2 fast
|
650 |
|
0 |
|a Public key infrastructure (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Infrastructure à clé publique (Sécurité informatique)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Public key infrastructure (Computer security)
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Public key infrastructure (Computer security)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Komar, Brian.
|t Windows Server 2008 PKI and certificate security.
|d Redmond, WA : Microsoft Press, 2008
|z 9780735625167
|w (DLC) 2008920575
|w (OCoLC)190395891
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780735625167/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0022905306
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 431647
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7462473
|
994 |
|
|
|a 92
|b IZTAP
|