Dr Tom Shinder's ISA Server and Beyond -  Syngress

Dr Tom Shinder's ISA Server and Beyond (eBook)

Real World Security Solutions for Microsoft Enterprise Networks

(Autor)

eBook Download: PDF
2002 | 1. Auflage
1000 Seiten
Elsevier Science (Verlag)
978-0-08-047739-8 (ISBN)
Systemvoraussetzungen
49,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task.

Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows 'security book.' It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers.

The only all-encompassing book on securing Microsoft networks.
·Windows NT, Windows 2000, Microsoft Internet Information Server (IIS), Microsoft Proxy Server, Microsoft Internet Security Accelerator, Microsoft Explorer are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks
Invaluable CD provides the weapons to defend your network.
·The accompanying CD is packed with third party tools, utilities, and software to defend your network.
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "e;security book."e; It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers.The only all-encompassing book on securing Microsoft networks. * Windows NT, Windows 2000, Microsoft Internet Information Server (IIS), Microsoft Proxy Server, Microsoft Internet Security Accelerator, Microsoft Explorer are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise NetworksInvaluable CD provides the weapons to defend your network. * The accompanying CD is packed with third party tools, utilities, and software to defend your network.
Erscheint lt. Verlag 1.12.2003
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-08-047739-9 / 0080477399
ISBN-13 978-0-08-047739-8 / 9780080477398
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 20,8 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
79,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99