Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Thors Microsoft Security Bible: A Collection of Practical Security Techniques - ISBN 9781597495721

Thors Microsoft Security Bible: A Collection of Practical Security Techniques

ISBN 9781597495721

Autor: Mullen, Timothy "Thor"

Wydawca: Elsevier

Dostępność: 3-6 tygodni

Cena: 262,50 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9781597495721

Autor:      

Mullen, Timothy "Thor"

Oprawa:      

Hardback

Rok Wydania:      

2011-08-26

Tematy:      

UR

Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes and methodologies uniquely illustrated through real-world process examples.

This book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, and application specific security (IIS, SQL, Active Directory, etc.). It also includes new, never-before-published security tools complete with source code; detailed technical information on security processes for all major Microsoft applications; unique project-based storytelling delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases; reference-style content for access to specific application security techniques and methods; actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so.

This book will be of interest to systems and network administrators, IT managers, security and network engineers, and database administrators.



Named the 2011 Best Systems Administration Book by InfoSec ReviewsDetailed technical information on security processes for all major Microsoft applicationsUnique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use casesReference-style content for access to specific application security techniques and methodsActual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so

Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG) Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV) Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL) Chapter 6. Remote Security Log Collection in a Least Privilege Environment Chapter 7. Securing RDP Appendix A: List Of Acronyms Appendix B: Full list of Server 2008 logs via WEVTUTIL tool

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy