Thor's Microsoft security bible

a collection of practical security techniques

Verfasser / Beitragende:
Timothy "Thor" Mullen ; Jeffrey W. Brown. technical editor
Ort, Verlag, Jahr:
Waltham, MA : Syngress, 2011
Beschreibung:
1 online resource (xi, 315 p.) : ill
Format:
Buch (online)
Online Zugang:
ID: 528953060
LEADER cam a22 7 4500
001 528953060
003 CHVBK
005 20200927091155.0
006 m d
007 cr |n ||||||||
008 110920s2011 maua sf 001 0 eng d
010 |a  2011499120 
020 |a 978-1-59749-572-1 
020 |a 1-59749-572-7 
035 |a (SERSOL)ssj0000507810 
035 |a (WaSeSS)ssj0000507810 
040 |a EIK  |c EIK  |d SINLB  |d CDX  |d DLC  |d WaSeSS 
050 0 0 |a QA76.9.A25  |b M843 2011 
082 0 4 |a 005.8  |2 22 
100 1 |a Mullen  |D Timothy M. 
245 1 0 |a Thor's Microsoft security bible  |h [Elektronische Daten]  |b a collection of practical security techniques  |c Timothy "Thor" Mullen ; Jeffrey W. Brown. technical editor 
260 |a Waltham, MA  |b Syngress  |c c2011 
300 |a 1 online resource (xi, 315 p.)  |b ill 
504 |a Includes index. 
505 0 |a Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG) -- Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV) -- Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation -- Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner -- Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL) -- Chapter 6. Remote Security Log Collection in a Least Privilege Environment -- Chapter 7. Securing RDP -- Appendix A: List Of Acronyms -- Appendix B: Full list of Server 2008 logs via WEVTUTIL tool. 
506 |a Lizenzbedingungen können den Zugang einschränken. License restrictions may limit access. 
520 |a "Thor's Microsoft Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code" - Syngress website. 
650 0 |a Computer security  |v Handbooks, manuals, etc 
650 0 |a Microsoft software  |x Security measures  |v Handbooks, manuals, etc 
856 4 0 |u https://proquest.safaribooksonline.com/9781597495721  |z Uni Basel: Volltext 
898 |a BK020053  |b XK020053  |c XK020000 
909 4 |f Safari Technical Books 
909 4 |a E-Books von 360MarcUpdates 
949 |B IDSBB  |F A145  |b A145  |c 145VT  |x NELA1451910 
950 |B IDSBB  |P 100  |E 1-  |a Mullen  |D Timothy M. 
950 |B IDSBB  |P 856  |E 40  |u https://proquest.safaribooksonline.com/9781597495721  |z Uni Basel: Volltext 
986 |a SWISSBIB  |b 528953060