<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>     cam a22     7  4500</leader>
  <controlfield tag="001">528953060</controlfield>
  <controlfield tag="003">CHVBK</controlfield>
  <controlfield tag="005">20200927091155.0</controlfield>
  <controlfield tag="006">m        d        </controlfield>
  <controlfield tag="007">cr |n ||||||||</controlfield>
  <controlfield tag="008">110920s2011    maua    sf    001 0 eng d</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
   <subfield code="a">  2011499120</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">978-1-59749-572-1</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1-59749-572-7</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(SERSOL)ssj0000507810</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(WaSeSS)ssj0000507810</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">EIK</subfield>
   <subfield code="c">EIK</subfield>
   <subfield code="d">SINLB</subfield>
   <subfield code="d">CDX</subfield>
   <subfield code="d">DLC</subfield>
   <subfield code="d">WaSeSS</subfield>
  </datafield>
  <datafield tag="050" ind1="0" ind2="0">
   <subfield code="a">QA76.9.A25</subfield>
   <subfield code="b">M843 2011</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="4">
   <subfield code="a">005.8</subfield>
   <subfield code="2">22</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Mullen</subfield>
   <subfield code="D">Timothy M.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Thor's Microsoft security bible</subfield>
   <subfield code="h">[Elektronische Daten]</subfield>
   <subfield code="b">a collection of practical security techniques</subfield>
   <subfield code="c">Timothy &quot;Thor&quot; Mullen ; Jeffrey W. Brown. technical editor</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Waltham, MA</subfield>
   <subfield code="b">Syngress</subfield>
   <subfield code="c">c2011</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xi, 315 p.)</subfield>
   <subfield code="b">ill</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes index.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG) -- Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV) -- Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation -- Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner -- Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL) -- Chapter 6. Remote Security Log Collection in a Least Privilege Environment -- Chapter 7. Securing RDP -- Appendix A: List Of Acronyms -- Appendix B: Full list of Server 2008 logs via WEVTUTIL tool.</subfield>
  </datafield>
  <datafield tag="506" ind1=" " ind2=" ">
   <subfield code="a">Lizenzbedingungen können den Zugang einschränken. License restrictions may limit access.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">&quot;Thor's Microsoft Security Bible provides a &quot;one-stop-shop&quot; for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code&quot; - Syngress website.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer security</subfield>
   <subfield code="v">Handbooks, manuals, etc</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Microsoft software</subfield>
   <subfield code="x">Security measures</subfield>
   <subfield code="v">Handbooks, manuals, etc</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">https://proquest.safaribooksonline.com/9781597495721</subfield>
   <subfield code="z">Uni Basel: Volltext</subfield>
  </datafield>
  <datafield tag="898" ind1=" " ind2=" ">
   <subfield code="a">BK020053</subfield>
   <subfield code="b">XK020053</subfield>
   <subfield code="c">XK020000</subfield>
  </datafield>
  <datafield tag="909" ind1=" " ind2="4">
   <subfield code="f">Safari Technical Books</subfield>
  </datafield>
  <datafield tag="909" ind1=" " ind2="4">
   <subfield code="a">E-Books von 360MarcUpdates</subfield>
  </datafield>
  <datafield tag="949" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="F">A145</subfield>
   <subfield code="b">A145</subfield>
   <subfield code="c">145VT</subfield>
   <subfield code="x">NELA1451910</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">100</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Mullen</subfield>
   <subfield code="D">Timothy M.</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">856</subfield>
   <subfield code="E">40</subfield>
   <subfield code="u">https://proquest.safaribooksonline.com/9781597495721</subfield>
   <subfield code="z">Uni Basel: Volltext</subfield>
  </datafield>
  <datafield tag="986" ind1=" " ind2=" ">
   <subfield code="a">SWISSBIB</subfield>
   <subfield code="b">528953060</subfield>
  </datafield>
 </record>
</collection>
