|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocm52149089 |
003 |
OCoLC |
005 |
20231117015040.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
030429s2002 maua o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d OCLCQ
|d OCLCF
|d NLGGC
|d OCLCO
|d EBLCP
|d OPELS
|d BAKER
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d AGLDB
|d ROC
|d MNS
|d RCC
|d D6H
|d OCLCQ
|d VTS
|d OCLCQ
|d OCLCO
|d INT
|d OCLCQ
|d STF
|d LEAUB
|d OL$
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 56694197
|a 162723272
|a 961677056
|a 962642966
|a 1020519720
|a 1053017339
|
020 |
|
|
|a 1932266402
|q (electronic bk.)
|
020 |
|
|
|a 9781932266405
|q (electronic bk.)
|
020 |
|
|
|a 9781931836661
|
020 |
|
|
|a 1931836663
|
035 |
|
|
|a (OCoLC)52149089
|z (OCoLC)56694197
|z (OCoLC)162723272
|z (OCoLC)961677056
|z (OCoLC)962642966
|z (OCoLC)1020519720
|z (OCoLC)1053017339
|
050 |
|
4 |
|a TK5105.59
|b .S55 2002eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 21
|
100 |
1 |
|
|a Shinder, Thomas W.
|
245 |
1 |
0 |
|a ISA server and beyond :
|b real world security solutions for Microsoft enterprise networks /
|c Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor.
|
246 |
1 |
|
|i At head of title:
|a Dr. Tom Shinder's
|
260 |
|
|
|a Rockland, MA :
|b Syngress Pub.,
|c �2002.
|
300 |
|
|
|a 1 online resource (xvi, 847 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
500 |
|
|
|a "Covers undocumented DMZ topologies, exchange server, and outlook web access"--Cover
|
500 |
|
|
|a "Integrates ISA server with Windows 2000 permissions, IIS security, EFS, wireless security, and IPSec"--Cover
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Chapter 1: Introduction -- Chapter 2: InfoWar: The 21st Century Battlefield -- Chapter 3: Network Security Fundamentals -- Chapter 4: Network Intrusions and Attacks -- Chapter 5: Creating complex IPSec Policies for intranet, extranet and Internet connectivity -- Chapter 6: Design and configure an enterprise Certificate Services -- Chapter 7: Windows Security Features -- Chapter 8: Design and configure an enterprise Certificate Services infrastructure -- Chapter 9: Design and configure PPTP and L2TP/IPSec VPNs -- Chapter 10: Building complex Mesh and Spoke and Hub VPN configurations -- Chapter 11: Design and configure secure Wireless networks -- Chapter 12: Design and configure Defense in Depth with Host based security strategies -- Chapter 13: Hardening IIS 4.0 5.0 and 6.0 -- Chapter 14: Secure common network services DNS, SNMP, WINS, DHCP and RADIUS -- Chapter 15: Conclusion.
|
520 |
|
|
|a The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers. The only all-encompassing book on securing Microsoft networks. Windows NT, Windows 2000, Microsoft Internet Information Server (IIS), Microsoft Proxy Server, Microsoft Internet Security Accelerator, Microsoft Explorer are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks Invaluable CD provides the weapons to defend your network. The accompanying CD is packed with third party tools, utilities, and software to defend your network
|
630 |
0 |
0 |
|a Microsoft ISA server.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a R�eseaux d'ordinateurs
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0263812
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
630 |
0 |
7 |
|a Microsoft ISA server
|2 fast
|0 (OCoLC)fst01394863
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|0 (OCoLC)fst00872341
|
700 |
1 |
|
|a Grasdal, Martin.
|
700 |
1 |
|
|a Shinder, Debra Littlejohn.
|
776 |
0 |
8 |
|i Print version:
|a Shinder, Thomas W.
|t ISA server and beyond.
|d Rockland, MA : Syngress Pub., �2002
|z 1931836663
|w (OCoLC)51757549
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781931836661
|z Texto completo
|