Fr. 78.00

Thor's Microsoft Security Bible - A Collection of Practical Security Techniques

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor Timothy "Thor? Mullen is an independent programming consultant who, after 25 years of supporting Microsoft operating systems and programming languages, has completely abandoned all Microsoft technologies in favor of Apple OS X and open source systems such as Linux and BSD. After years working for the software giant, Thor now condemns the company for their unethical practices and evangelizes for Apple OS X and open systems and has committed his research to the betterment of users by providing guidance for users to switch from their dependency upon Windows and enjoy the superior, secure, and feature-rich experience that is OS X. Klappentext This book provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. It contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, and application specific security and also includes new security tools complete with source code. Inhaltsverzeichnis Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG) Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV) Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL) Chapter 6. Remote Security Log Collection in a Least Privilege Environment Chapter 7. Securing RDP Appendix A: List Of Acronyms Appendix B: Full list of Server 2008 logs via WEVTUTIL tool ...

Product details

Authors Jeffery W. (EDT) / Brown, Timothy Mullen, Timothy "Thor"/ Brown Mullen, Timothy " Mullen, Timothy Thor Mullen, Timothy 'Thor'/ Brown Mullen, Thor"
Publisher ELSEVIER SCIENCE BV
 
Languages English
Product format Hardback
Released 30.09.2011
 
EAN 9781597495721
ISBN 978-1-59749-572-1
No. of pages 315
Dimensions 191 mm x 241 mm x 25 mm
Series Syngress Media
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.