Cargando…

Thor's Microsoft security bible : a collection of practical security techniques /

Thor's Microsoft� Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every l...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mullen, Timothy M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, �2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn744636958
003 OCoLC
005 20231117044615.0
006 m o d
007 cr cn|||||||||
008 110803s2011 mau obf 001 0 eng d
010 |z  2011499120 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d YDXCP  |d BWX  |d OCLCQ  |d N$T  |d E7B  |d OCLCQ  |d CDX  |d UKMGB  |d DKDLA  |d TEF  |d FER  |d B24X7  |d DEBSZ  |d OCLCQ  |d UMI  |d OCLCQ  |d COO  |d OCLCQ  |d LIV  |d ESU  |d OCLCA  |d OCLCF  |d U3W  |d CEF  |d WYU  |d OCLCQ  |d UAB  |d LEAUB  |d UKAHL  |d OL$  |d VT2  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO  |d COM  |d OCLCO  |d OCLCQ  |d INARC  |d OCLCO 
016 7 |a 015965343  |2 Uk 
019 |a 707608423  |a 753700922  |a 769233702  |a 796014490  |a 816348946  |a 966397952  |a 1066569713  |a 1129361430  |a 1360077163 
020 |a 9781597495721  |q (electronic bk.) 
020 |a 1597495727  |q (electronic bk.) 
020 |a 9781597495738  |q (electronic bk.) 
020 |a 1597495735  |q (electronic bk.) 
035 |a (OCoLC)744636958  |z (OCoLC)707608423  |z (OCoLC)753700922  |z (OCoLC)769233702  |z (OCoLC)796014490  |z (OCoLC)816348946  |z (OCoLC)966397952  |z (OCoLC)1066569713  |z (OCoLC)1129361430  |z (OCoLC)1360077163 
050 4 |a QA76.9.A25  |b M85 2011 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Mullen, Timothy M. 
245 1 0 |a Thor's Microsoft security bible :  |b a collection of practical security techniques /  |c Timothy Mullen. 
260 |a Waltham, MA :  |b Syngress,  |c �2011. 
300 |a 1 online resource (xi, 315 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Thor's Microsoft� Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases Reference-style content for access to specific application security techniques and methods Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so DVD Companion disk with source code, tools, video tutorials, and other materials 
505 0 |a Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG) -- Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV) -- Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation -- Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner -- Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL) -- Chapter 6. Remote Security Log Collection in a Least Privilege Environment -- Chapter 7. Securing RDP -- Appendix A: List Of Acronyms -- Appendix B: Full list of Server 2008 logs via WEVTUTIL tool. 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
650 0 |a Computer security  |v Handbooks, manuals, etc. 
650 0 |a Microsoft software  |x Security measures  |v Handbooks, manuals, etc. 
650 6 |a S�ecurit�e informatique  |0 (CaQQLa)201-0061152  |v Guides, manuels, etc.  |0 (CaQQLa)201-0377046 
650 6 |a Logiciels Microsoft  |0 (CaQQLa)201-0299375  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures  |0 (CaQQLa)201-0373949  |v Guides, manuels, etc.  |0 (CaQQLa)201-0377046 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
655 2 |a Handbook  |0 (DNLM)D020479 
655 7 |a handbooks.  |2 aat  |0 (CStmoGRI)aatgf300311807 
655 7 |a Handbooks and manuals  |2 fast  |0 (OCoLC)fst01423877 
655 7 |a Handbooks and manuals.  |2 lcgft 
655 7 |a Guides et manuels.  |2 rvmgf  |0 (CaQQLa)RVMGF-000001065 
776 0 8 |i Print version:  |a Mullen, Timothy M.  |t Thor's Microsoft security bible.  |b [Print ed.].  |d Waltham, MA : Syngress/Elsevier, �2011  |z 9781597495721  |w (OCoLC)752549309 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597495721  |z Texto completo