Cargando…

Securing Citrix XenApp Server in the enterprise /

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bin Azad, Tariq, Wilson, Connie, Wright., Michael
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, Mass. : Oxford : Syngress ; Elsevier Science [distributor], 2008.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn272382247
003 OCoLC
005 20231117015130.0
006 m o d
007 cr cn|||||||||
008 081117s2008 maua o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d LGG  |d N$T  |d CDX  |d UBY  |d IDEBK  |d E7B  |d UMI  |d CEF  |d CNCGM  |d NHM  |d B24X7  |d DEBSZ  |d OCLCQ  |d COO  |d LIV  |d OCLCQ  |d OCLCO  |d OCLCA  |d OCLCF  |d D6H  |d WYU  |d UAB  |d LEAUB  |d OL$  |d VT2  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBA868956  |2 bnb 
016 7 |a 014621751  |2 Uk 
019 |a 263493326  |a 316262734  |a 354466113  |a 463291619  |a 505103986  |a 646758205  |a 656451475  |a 712979632  |a 1044563758  |a 1056379774  |a 1062910966  |a 1152981095  |a 1192331307  |a 1240535333 
020 |a 9781597492812 
020 |a 1597492817 
020 |a 9780080569987  |q (electronic bk.) 
020 |a 0080569986  |q (electronic bk.) 
024 8 |a 9786611755027 
035 |a (OCoLC)272382247  |z (OCoLC)263493326  |z (OCoLC)316262734  |z (OCoLC)354466113  |z (OCoLC)463291619  |z (OCoLC)505103986  |z (OCoLC)646758205  |z (OCoLC)656451475  |z (OCoLC)712979632  |z (OCoLC)1044563758  |z (OCoLC)1056379774  |z (OCoLC)1062910966  |z (OCoLC)1152981095  |z (OCoLC)1192331307  |z (OCoLC)1240535333 
050 4 |a QA76.9.C55  |b S369 2008eb 
072 7 |a COM  |x 046000  |2 bisacsh 
082 0 4 |a 005.4476  |2 22 
245 0 0 |a Securing Citrix XenApp Server in the enterprise /  |c Tariq Bin Azad, technical editor ; Connie Wilson, Michael Wright, contributors. 
260 |a Burlington, Mass. :  |b Syngress ;  |a Oxford :  |b Elsevier Science [distributor],  |c 2008. 
300 |a 1 online resource (xxviii, 739 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it?s running on. By definition, Citrix is granting remote users direct access to corporate servers?.achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains. * The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server. * Special chapter by Security researcher Petko D. Petkov?aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers. * Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server 
505 0 |a 1: Advanced Encryption Standard Support; 2: Citrix Password Manager; 3: Security Considerations in a Citrix Presentation Server Deployment; 4 FIPS 140 and Citrix Presentation; 5 Kerberos Authentication; 6 Citrix Presentation Server Clients; 7 Virtual Channels; 8: Additional Citrix Presentation Server Security Features 9: Deploying SSL Relay; 10: Deploying Secure Gateway; 11: Using Secure Gateway (Double-Hop); 12: Using SSL Relay and the Web Interface. 
500 |a Includes index. 
588 0 |a Print version record. 
630 0 0 |a Citrix MetaFrame. 
650 0 |a Client/server computing  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Architecture client-serveur (Informatique)  |0 (CaQQLa)201-0251236  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 7 |a COMPUTERS  |x Operating Systems  |x General.  |2 bisacsh 
630 0 7 |a Citrix MetaFrame.  |2 blmlsh 
630 0 7 |a Citrix MetaFrame  |2 fast  |0 (OCoLC)fst01393844 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
700 1 |a Bin Azad, Tariq. 
700 1 |a Wilson, Connie. 
700 1 |a Wright., Michael. 
776 0 8 |i Print version:  |t Securing Citrix XenApp Server in the enterprise.  |d Burlington, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2008  |z 9781597492812  |z 1597492817  |w (DLC) 2008275630  |w (OCoLC)243602291 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597492812  |z Texto completo