Cargando…

Thor's Microsoft security bible : a collection of practical security techniques /

Thor's Microsoftʼ Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Serve...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mullen, Timothy M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, ©2011.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn744636958
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 110803s2011 mau obf 001 0 eng d
010 |z  2011499120 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d YDXCP  |d BWX  |d OCLCQ  |d N$T  |d E7B  |d OCLCQ  |d CDX  |d UKMGB  |d DKDLA  |d TEF  |d FER  |d B24X7  |d DEBSZ  |d OCLCQ  |d UMI  |d OCLCQ  |d COO  |d OCLCQ  |d LIV  |d ESU  |d OCLCA  |d OCLCF  |d U3W  |d CEF  |d WYU  |d OCLCQ  |d UAB  |d LEAUB  |d UKAHL  |d OL$  |d VT2  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO  |d COM  |d OCLCO  |d OCLCQ  |d INARC  |d OCLCO 
016 7 |a 015965343  |2 Uk 
019 |a 707608423  |a 753700922  |a 769233702  |a 796014490  |a 816348946  |a 966397952  |a 1066569713  |a 1129361430  |a 1360077163 
020 |a 9781597495721  |q (electronic bk.) 
020 |a 1597495727  |q (electronic bk.) 
020 |a 9781597495738  |q (electronic bk.) 
020 |a 1597495735  |q (electronic bk.) 
029 1 |a AU@  |b 000050239810 
029 1 |a AU@  |b 000053281064 
029 1 |a AU@  |b 000062340125 
029 1 |a CHBIS  |b 007226547 
029 1 |a CHNEW  |b 000608863 
029 1 |a CHNEW  |b 001010188 
029 1 |a CHVBK  |b 181950650 
029 1 |a DEBBG  |b BV042314281 
029 1 |a DEBSZ  |b 360078710 
029 1 |a DEBSZ  |b 372703585 
029 1 |a DEBSZ  |b 378295306 
029 1 |a GBVCP  |b 785358188 
029 1 |a NZ1  |b 15189614 
035 |a (OCoLC)744636958  |z (OCoLC)707608423  |z (OCoLC)753700922  |z (OCoLC)769233702  |z (OCoLC)796014490  |z (OCoLC)816348946  |z (OCoLC)966397952  |z (OCoLC)1066569713  |z (OCoLC)1129361430  |z (OCoLC)1360077163 
037 |a CL0500000173  |b Safari Books Online 
050 4 |a QA76.9.A25  |b M85 2011 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Mullen, Timothy M. 
245 1 0 |a Thor's Microsoft security bible :  |b a collection of practical security techniques /  |c Timothy Mullen. 
260 |a Waltham, MA :  |b Syngress,  |c ©2011. 
300 |a 1 online resource (xi, 315 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Thor's Microsoftʼ Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases Reference-style content for access to specific application security techniques and methods Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so DVD Companion disk with source code, tools, video tutorials, and other materials 
505 0 |a Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG) -- Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV) -- Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation -- Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner -- Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL) -- Chapter 6. Remote Security Log Collection in a Least Privilege Environment -- Chapter 7. Securing RDP -- Appendix A: List Of Acronyms -- Appendix B: Full list of Server 2008 logs via WEVTUTIL tool. 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |v Handbooks, manuals, etc. 
650 0 |a Microsoft software  |x Security measures  |v Handbooks, manuals, etc. 
650 6 |a Sécurité informatique  |v Guides, manuels, etc. 
650 6 |a Logiciels Microsoft  |x Sécurité  |x Mesures  |v Guides, manuels, etc. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
655 2 |a Handbook 
655 7 |a handbooks.  |2 aat 
655 7 |a Handbooks and manuals  |2 fast 
655 7 |a Handbooks and manuals.  |2 lcgft 
655 7 |a Guides et manuels.  |2 rvmgf 
776 0 8 |i Print version:  |a Mullen, Timothy M.  |t Thor's Microsoft security bible.  |b [Print ed.].  |d Waltham, MA : Syngress/Elsevier, ©2011  |z 9781597495721  |w (OCoLC)752549309 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597495738/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH23095080 
938 |a Books 24x7  |b B247  |n bks00044724 
938 |a Coutts Information Services  |b COUT  |n 18296742 
938 |a ebrary  |b EBRY  |n ebr10488602 
938 |a EBSCOhost  |b EBSC  |n 383423 
938 |a YBP Library Services  |b YANK  |n 3647098 
938 |a YBP Library Services  |b YANK  |n 7034459 
938 |a Internet Archive  |b INAR  |n thorsmicrosoftse0000mull 
994 |a 92  |b IZTAP