Thor's Microsoft security bible
a collection of practical security techniques
Gespeichert in:
Verfasser / Beitragende:
Timothy "Thor" Mullen ; Jeffrey W. Brown. technical editor
Ort, Verlag, Jahr:
Waltham, MA :
Syngress,
2011
Beschreibung:
1 online resource (xi, 315 p.) : ill
Format:
Buch (online)
Online Zugang:
| LEADER | cam a22 7 4500 | ||
|---|---|---|---|
| 001 | 528953060 | ||
| 003 | CHVBK | ||
| 005 | 20200927091155.0 | ||
| 006 | m d | ||
| 007 | cr |n |||||||| | ||
| 008 | 110920s2011 maua sf 001 0 eng d | ||
| 010 | |a 2011499120 | ||
| 020 | |a 978-1-59749-572-1 | ||
| 020 | |a 1-59749-572-7 | ||
| 035 | |a (SERSOL)ssj0000507810 | ||
| 035 | |a (WaSeSS)ssj0000507810 | ||
| 040 | |a EIK |c EIK |d SINLB |d CDX |d DLC |d WaSeSS | ||
| 050 | 0 | 0 | |a QA76.9.A25 |b M843 2011 |
| 082 | 0 | 4 | |a 005.8 |2 22 |
| 100 | 1 | |a Mullen |D Timothy M. | |
| 245 | 1 | 0 | |a Thor's Microsoft security bible |h [Elektronische Daten] |b a collection of practical security techniques |c Timothy "Thor" Mullen ; Jeffrey W. Brown. technical editor |
| 260 | |a Waltham, MA |b Syngress |c c2011 | ||
| 300 | |a 1 online resource (xi, 315 p.) |b ill | ||
| 504 | |a Includes index. | ||
| 505 | 0 | |a Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG) -- Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV) -- Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation -- Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner -- Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL) -- Chapter 6. Remote Security Log Collection in a Least Privilege Environment -- Chapter 7. Securing RDP -- Appendix A: List Of Acronyms -- Appendix B: Full list of Server 2008 logs via WEVTUTIL tool. | |
| 506 | |a Lizenzbedingungen können den Zugang einschränken. License restrictions may limit access. | ||
| 520 | |a "Thor's Microsoft Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code" - Syngress website. | ||
| 650 | 0 | |a Computer security |v Handbooks, manuals, etc | |
| 650 | 0 | |a Microsoft software |x Security measures |v Handbooks, manuals, etc | |
| 856 | 4 | 0 | |u https://proquest.safaribooksonline.com/9781597495721 |z Uni Basel: Volltext |
| 898 | |a BK020053 |b XK020053 |c XK020000 | ||
| 909 | 4 | |f Safari Technical Books | |
| 909 | 4 | |a E-Books von 360MarcUpdates | |
| 949 | |B IDSBB |F A145 |b A145 |c 145VT |x NELA1451910 | ||
| 950 | |B IDSBB |P 100 |E 1- |a Mullen |D Timothy M. | ||
| 950 | |B IDSBB |P 856 |E 40 |u https://proquest.safaribooksonline.com/9781597495721 |z Uni Basel: Volltext | ||
| 986 | |a SWISSBIB |b 528953060 | ||