ISA server and beyond: real world security solutions for Microsoft enterprise networks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
c2002
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes index. - "Covers undocumented DMZ topologies, exchange server, and outlook web access"--Cover. - "Integrates ISA server with Windows 2000 permissions, IIS security, EFS, wireless security, and IPSec"--Cover At head of title: Dr. Tom Shinder's The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers. The only all-encompassing book on securing Microsoft networks. Windows NT, Windows 2000, Microsoft Internet Information Server (IIS), Microsoft Proxy Server, Microsoft Internet Security Accelerator, Microsoft Explorer are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks Invaluable CD provides the weapons to defend your network. The accompanying CD is packed with third party tools, utilities, and software to defend your network |
Beschreibung: | 1 Online-Ressource (xvi, 847 p.) |
ISBN: | 1931836663 1932266402 9781931836661 9781932266405 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307317 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2002 |||| o||u| ||||||eng d | ||
020 | |a 1931836663 |9 1-931836-66-3 | ||
020 | |a 1932266402 |c electronic bk. |9 1-932266-40-2 | ||
020 | |a 9781931836661 |9 978-1-931836-66-1 | ||
020 | |a 9781932266405 |c electronic bk. |9 978-1-932266-40-5 | ||
035 | |a (OCoLC)52149089 | ||
035 | |a (DE-599)BVBBV042307317 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Shinder, Thomas W. |e Verfasser |4 aut | |
245 | 1 | 0 | |a ISA server and beyond |b real world security solutions for Microsoft enterprise networks |c Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor |
246 | 1 | 3 | |a Dr. Tom Shinder's |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c c2002 | |
300 | |a 1 Online-Ressource (xvi, 847 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index. - "Covers undocumented DMZ topologies, exchange server, and outlook web access"--Cover. - "Integrates ISA server with Windows 2000 permissions, IIS security, EFS, wireless security, and IPSec"--Cover | ||
500 | |a At head of title: Dr. Tom Shinder's | ||
500 | |a The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers. The only all-encompassing book on securing Microsoft networks. Windows NT, Windows 2000, Microsoft Internet Information Server (IIS), Microsoft Proxy Server, Microsoft Internet Security Accelerator, Microsoft Explorer are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks Invaluable CD provides the weapons to defend your network. The accompanying CD is packed with third party tools, utilities, and software to defend your network | ||
630 | 0 | 4 | |a Microsoft ISA server |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Microsoft ISA server |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Grasdal, Martin |e Sonstige |4 oth | |
700 | 1 | |a Shinder, Debra Littlejohn |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836661 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744309 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781931836661 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152892473475072 |
---|---|
any_adam_object | |
author | Shinder, Thomas W. |
author_facet | Shinder, Thomas W. |
author_role | aut |
author_sort | Shinder, Thomas W. |
author_variant | t w s tw tws |
building | Verbundindex |
bvnumber | BV042307317 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)52149089 (DE-599)BVBBV042307317 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03935nmm a2200505zc 4500</leader><controlfield tag="001">BV042307317</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836663</subfield><subfield code="9">1-931836-66-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266402</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-932266-40-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836661</subfield><subfield code="9">978-1-931836-66-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266405</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-932266-40-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52149089</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307317</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shinder, Thomas W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">ISA server and beyond</subfield><subfield code="b">real world security solutions for Microsoft enterprise networks</subfield><subfield code="c">Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Dr. Tom Shinder's</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 847 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - "Covers undocumented DMZ topologies, exchange server, and outlook web access"--Cover. - "Integrates ISA server with Windows 2000 permissions, IIS security, EFS, wireless security, and IPSec"--Cover</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">At head of title: Dr. Tom Shinder's</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers. The only all-encompassing book on securing Microsoft networks. Windows NT, Windows 2000, Microsoft Internet Information Server (IIS), Microsoft Proxy Server, Microsoft Internet Security Accelerator, Microsoft Explorer are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks Invaluable CD provides the weapons to defend your network. The accompanying CD is packed with third party tools, utilities, and software to defend your network</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft ISA server</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft ISA server</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Grasdal, Martin</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shinder, Debra Littlejohn</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836661</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744309</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836661</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307317 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 1931836663 1932266402 9781931836661 9781932266405 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744309 |
oclc_num | 52149089 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xvi, 847 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Shinder, Thomas W. Verfasser aut ISA server and beyond real world security solutions for Microsoft enterprise networks Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor Dr. Tom Shinder's Rockland, MA Syngress Pub. c2002 1 Online-Ressource (xvi, 847 p.) txt rdacontent c rdamedia cr rdacarrier Includes index. - "Covers undocumented DMZ topologies, exchange server, and outlook web access"--Cover. - "Integrates ISA server with Windows 2000 permissions, IIS security, EFS, wireless security, and IPSec"--Cover At head of title: Dr. Tom Shinder's The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers. The only all-encompassing book on securing Microsoft networks. Windows NT, Windows 2000, Microsoft Internet Information Server (IIS), Microsoft Proxy Server, Microsoft Internet Security Accelerator, Microsoft Explorer are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks Invaluable CD provides the weapons to defend your network. The accompanying CD is packed with third party tools, utilities, and software to defend your network Microsoft ISA server COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Microsoft ISA server fast Computer networks / Security measures fast Computer networks Security measures Grasdal, Martin Sonstige oth Shinder, Debra Littlejohn Sonstige oth http://www.sciencedirect.com/science/book/9781931836661 Verlag Volltext |
spellingShingle | Shinder, Thomas W. ISA server and beyond real world security solutions for Microsoft enterprise networks Microsoft ISA server COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Microsoft ISA server fast Computer networks / Security measures fast Computer networks Security measures |
title | ISA server and beyond real world security solutions for Microsoft enterprise networks |
title_alt | Dr. Tom Shinder's |
title_auth | ISA server and beyond real world security solutions for Microsoft enterprise networks |
title_exact_search | ISA server and beyond real world security solutions for Microsoft enterprise networks |
title_full | ISA server and beyond real world security solutions for Microsoft enterprise networks Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor |
title_fullStr | ISA server and beyond real world security solutions for Microsoft enterprise networks Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor |
title_full_unstemmed | ISA server and beyond real world security solutions for Microsoft enterprise networks Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor |
title_short | ISA server and beyond |
title_sort | isa server and beyond real world security solutions for microsoft enterprise networks |
title_sub | real world security solutions for Microsoft enterprise networks |
topic | Microsoft ISA server COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Microsoft ISA server fast Computer networks / Security measures fast Computer networks Security measures |
topic_facet | Microsoft ISA server COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781931836661 |
work_keys_str_mv | AT shinderthomasw isaserverandbeyondrealworldsecuritysolutionsformicrosoftenterprisenetworks AT grasdalmartin isaserverandbeyondrealworldsecuritysolutionsformicrosoftenterprisenetworks AT shinderdebralittlejohn isaserverandbeyondrealworldsecuritysolutionsformicrosoftenterprisenetworks AT shinderthomasw drtomshinders AT grasdalmartin drtomshinders AT shinderdebralittlejohn drtomshinders |