|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn744636958 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
110803s2011 mau obf 001 0 eng d |
010 |
|
|
|z 2011499120
|
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d YDXCP
|d BWX
|d OCLCQ
|d N$T
|d E7B
|d OCLCQ
|d CDX
|d UKMGB
|d DKDLA
|d TEF
|d FER
|d B24X7
|d DEBSZ
|d OCLCQ
|d UMI
|d OCLCQ
|d COO
|d OCLCQ
|d LIV
|d ESU
|d OCLCA
|d OCLCF
|d U3W
|d CEF
|d WYU
|d OCLCQ
|d UAB
|d LEAUB
|d UKAHL
|d OL$
|d VT2
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|d COM
|d OCLCO
|d OCLCQ
|d INARC
|d OCLCO
|
016 |
7 |
|
|a 015965343
|2 Uk
|
019 |
|
|
|a 707608423
|a 753700922
|a 769233702
|a 796014490
|a 816348946
|a 966397952
|a 1066569713
|a 1129361430
|a 1360077163
|
020 |
|
|
|a 9781597495721
|q (electronic bk.)
|
020 |
|
|
|a 1597495727
|q (electronic bk.)
|
020 |
|
|
|a 9781597495738
|q (electronic bk.)
|
020 |
|
|
|a 1597495735
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000050239810
|
029 |
1 |
|
|a AU@
|b 000053281064
|
029 |
1 |
|
|a AU@
|b 000062340125
|
029 |
1 |
|
|a CHBIS
|b 007226547
|
029 |
1 |
|
|a CHNEW
|b 000608863
|
029 |
1 |
|
|a CHNEW
|b 001010188
|
029 |
1 |
|
|a CHVBK
|b 181950650
|
029 |
1 |
|
|a DEBBG
|b BV042314281
|
029 |
1 |
|
|a DEBSZ
|b 360078710
|
029 |
1 |
|
|a DEBSZ
|b 372703585
|
029 |
1 |
|
|a DEBSZ
|b 378295306
|
029 |
1 |
|
|a GBVCP
|b 785358188
|
029 |
1 |
|
|a NZ1
|b 15189614
|
035 |
|
|
|a (OCoLC)744636958
|z (OCoLC)707608423
|z (OCoLC)753700922
|z (OCoLC)769233702
|z (OCoLC)796014490
|z (OCoLC)816348946
|z (OCoLC)966397952
|z (OCoLC)1066569713
|z (OCoLC)1129361430
|z (OCoLC)1360077163
|
037 |
|
|
|a CL0500000173
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b M85 2011
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mullen, Timothy M.
|
245 |
1 |
0 |
|a Thor's Microsoft security bible :
|b a collection of practical security techniques /
|c Timothy Mullen.
|
260 |
|
|
|a Waltham, MA :
|b Syngress,
|c ©2011.
|
300 |
|
|
|a 1 online resource (xi, 315 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Thor's Microsoftʼ Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases Reference-style content for access to specific application security techniques and methods Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so DVD Companion disk with source code, tools, video tutorials, and other materials
|
505 |
0 |
|
|a Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG) -- Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV) -- Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation -- Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner -- Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL) -- Chapter 6. Remote Security Log Collection in a Least Privilege Environment -- Chapter 7. Securing RDP -- Appendix A: List Of Acronyms -- Appendix B: Full list of Server 2008 logs via WEVTUTIL tool.
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Microsoft software
|x Security measures
|v Handbooks, manuals, etc.
|
650 |
|
6 |
|a Sécurité informatique
|v Guides, manuels, etc.
|
650 |
|
6 |
|a Logiciels Microsoft
|x Sécurité
|x Mesures
|v Guides, manuels, etc.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
655 |
|
2 |
|a Handbook
|
655 |
|
7 |
|a handbooks.
|2 aat
|
655 |
|
7 |
|a Handbooks and manuals
|2 fast
|
655 |
|
7 |
|a Handbooks and manuals.
|2 lcgft
|
655 |
|
7 |
|a Guides et manuels.
|2 rvmgf
|
776 |
0 |
8 |
|i Print version:
|a Mullen, Timothy M.
|t Thor's Microsoft security bible.
|b [Print ed.].
|d Waltham, MA : Syngress/Elsevier, ©2011
|z 9781597495721
|w (OCoLC)752549309
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597495738/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH23095080
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00044724
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 18296742
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10488602
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 383423
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3647098
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7034459
|
938 |
|
|
|a Internet Archive
|b INAR
|n thorsmicrosoftse0000mull
|
994 |
|
|
|a 92
|b IZTAP
|