How to cheat at configuring ISA server 2004:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress
c2006
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes index How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day. How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books twice its size, this is a concise, to-the-point guide. * Administrators daily jobs - too many mission critical tasks in too little time. A quick reference to ISA Server * Written by Dr. Tom Shinder, the undisputed authority on Installing, Configuring, Managing and Troubleshooting ISA Server * Includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation |
Beschreibung: | 1 Online-Ressource (xxvii, 594 p.) |
ISBN: | 1429413271 1597490571 1597490970 9781429413275 9781597490573 9781597490979 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307665 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2006 |||| o||u| ||||||eng d | ||
020 | |a 1429413271 |c electronic bk. |9 1-4294-1327-1 | ||
020 | |a 1597490571 |9 1-59749-057-1 | ||
020 | |a 1597490970 |9 1-59749-097-0 | ||
020 | |a 9781429413275 |c electronic bk. |9 978-1-4294-1327-5 | ||
020 | |a 9781597490573 |9 978-1-59749-057-3 | ||
020 | |a 9781597490979 |9 978-1-59749-097-9 | ||
035 | |a (OCoLC)162597489 | ||
035 | |a (DE-599)BVBBV042307665 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Shinder, Thomas W. |e Verfasser |4 aut | |
245 | 1 | 0 | |a How to cheat at configuring ISA server 2004 |c Thomas W. Shinder, Debra Littlejohn Shinder |
246 | 1 | 3 | |a Configuring ISA server 2004 |
264 | 1 | |a Rockland, Mass. |b Syngress |c c2006 | |
300 | |a 1 Online-Ressource (xxvii, 594 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day. How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books twice its size, this is a concise, to-the-point guide. * Administrators daily jobs - too many mission critical tasks in too little time. A quick reference to ISA Server * Written by Dr. Tom Shinder, the undisputed authority on Installing, Configuring, Managing and Troubleshooting ISA Server * Includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation | ||
630 | 0 | 4 | |a Microsoft ISA server |
650 | 7 | |a Software |2 fast | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Microsoft ISA server |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Firewalls (Computer security) | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Internet |x Security measures |v Software | |
700 | 1 | |a Shinder, Debra Littlejohn |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597490573 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744657 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597490573 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152893248372736 |
---|---|
any_adam_object | |
author | Shinder, Thomas W. |
author_facet | Shinder, Thomas W. |
author_role | aut |
author_sort | Shinder, Thomas W. |
author_variant | t w s tw tws |
building | Verbundindex |
bvnumber | BV042307665 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)162597489 (DE-599)BVBBV042307665 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03091nmm a2200565zc 4500</leader><controlfield tag="001">BV042307665</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429413271</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-1327-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490571</subfield><subfield code="9">1-59749-057-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490970</subfield><subfield code="9">1-59749-097-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429413275</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-1327-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490573</subfield><subfield code="9">978-1-59749-057-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490979</subfield><subfield code="9">978-1-59749-097-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162597489</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307665</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shinder, Thomas W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to cheat at configuring ISA server 2004</subfield><subfield code="c">Thomas W. Shinder, Debra Littlejohn Shinder</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Configuring ISA server 2004</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 594 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day. How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books twice its size, this is a concise, to-the-point guide. * Administrators daily jobs - too many mission critical tasks in too little time. A quick reference to ISA Server * Written by Dr. Tom Shinder, the undisputed authority on Installing, Configuring, Managing and Troubleshooting ISA Server * Includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft ISA server</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft ISA server</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="v">Software</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shinder, Debra Littlejohn</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490573</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744657</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490573</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307665 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:57Z |
institution | BVB |
isbn | 1429413271 1597490571 1597490970 9781429413275 9781597490573 9781597490979 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744657 |
oclc_num | 162597489 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxvii, 594 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress |
record_format | marc |
spelling | Shinder, Thomas W. Verfasser aut How to cheat at configuring ISA server 2004 Thomas W. Shinder, Debra Littlejohn Shinder Configuring ISA server 2004 Rockland, Mass. Syngress c2006 1 Online-Ressource (xxvii, 594 p.) txt rdacontent c rdamedia cr rdacarrier Includes index How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day. How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books twice its size, this is a concise, to-the-point guide. * Administrators daily jobs - too many mission critical tasks in too little time. A quick reference to ISA Server * Written by Dr. Tom Shinder, the undisputed authority on Installing, Configuring, Managing and Troubleshooting ISA Server * Includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation Microsoft ISA server Software fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Microsoft ISA server fast Computer networks / Security measures fast Firewalls (Computer security) fast Internet / Security measures fast Firewalls (Computer security) Computer networks Security measures Internet Security measures Software Shinder, Debra Littlejohn Sonstige oth http://www.sciencedirect.com/science/book/9781597490573 Verlag Volltext |
spellingShingle | Shinder, Thomas W. How to cheat at configuring ISA server 2004 Microsoft ISA server Software fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Microsoft ISA server fast Computer networks / Security measures fast Firewalls (Computer security) fast Internet / Security measures fast Firewalls (Computer security) Computer networks Security measures Internet Security measures Software |
title | How to cheat at configuring ISA server 2004 |
title_alt | Configuring ISA server 2004 |
title_auth | How to cheat at configuring ISA server 2004 |
title_exact_search | How to cheat at configuring ISA server 2004 |
title_full | How to cheat at configuring ISA server 2004 Thomas W. Shinder, Debra Littlejohn Shinder |
title_fullStr | How to cheat at configuring ISA server 2004 Thomas W. Shinder, Debra Littlejohn Shinder |
title_full_unstemmed | How to cheat at configuring ISA server 2004 Thomas W. Shinder, Debra Littlejohn Shinder |
title_short | How to cheat at configuring ISA server 2004 |
title_sort | how to cheat at configuring isa server 2004 |
topic | Microsoft ISA server Software fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Microsoft ISA server fast Computer networks / Security measures fast Firewalls (Computer security) fast Internet / Security measures fast Firewalls (Computer security) Computer networks Security measures Internet Security measures Software |
topic_facet | Microsoft ISA server Software COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Firewalls (Computer security) Internet / Security measures Computer networks Security measures Internet Security measures Software |
url | http://www.sciencedirect.com/science/book/9781597490573 |
work_keys_str_mv | AT shinderthomasw howtocheatatconfiguringisaserver2004 AT shinderdebralittlejohn howtocheatatconfiguringisaserver2004 AT shinderthomasw configuringisaserver2004 AT shinderdebralittlejohn configuringisaserver2004 |