Windows server 2012 security from end to edge and beyond: architecting, designing, planning, and deploying Windows server 2012 security solutions
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier
2013
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes bibliographical references and index Windows 8 Security from End to Edge and Beyond shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access. Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows security technologies and how you can deploy them effectively in both the traditional datacenter and in new cloud-based solutions. When you finish the book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features first in a Test Lab and then in pilot and production environments. Windows 8 Security introduces the revolutionary "Test Lab Guide" approach to hands-on experiences with the security technologies discussed in the book. This approach enables you to test every subject covered in the book in a predefined Test Lab Environment. The combination of Test Lab experience with conceptual and deployment guidance enables you to understand the technologies in record time and move from Test Lab to production faster than ever before. Critical material is presented in a number of ways, including key concepts, scenario-based approaches to evaluation, planning, deployment and management, as well as the Test Lab Guides. You can also download video that illustrates the functionality in the Test Lab from the authors' blog http://blogs.technet.com.b.security_talk/. In addition, each chapter wraps up with an "Administrators Punch List," a bullet list summary of key concepts discussed in the chapter. Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8. Test Lab Guides enable you to test everything before deploying live to your system |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 9781597499811 1597499811 9781597499804 1597499803 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314319 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781597499811 |c electronic bk. |9 978-1-59749-981-1 | ||
020 | |a 1597499811 |c electronic bk. |9 1-59749-981-1 | ||
020 | |a 9781597499804 |9 978-1-59749-980-4 | ||
020 | |a 1597499803 |9 1-59749-980-3 | ||
035 | |a (OCoLC)841488677 | ||
035 | |a (DE-599)BVBBV042314319 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Shinder, Thomas W. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Windows server 2012 security from end to edge and beyond |b architecting, designing, planning, and deploying Windows server 2012 security solutions |c Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder |
264 | 1 | |a Amsterdam |b Elsevier |c 2013 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Windows 8 Security from End to Edge and Beyond shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access. Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows security technologies and how you can deploy them effectively in both the traditional datacenter and in new cloud-based solutions. When you finish the book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features first in a Test Lab and then in pilot and production environments. | ||
500 | |a Windows 8 Security introduces the revolutionary "Test Lab Guide" approach to hands-on experiences with the security technologies discussed in the book. This approach enables you to test every subject covered in the book in a predefined Test Lab Environment. The combination of Test Lab experience with conceptual and deployment guidance enables you to understand the technologies in record time and move from Test Lab to production faster than ever before. Critical material is presented in a number of ways, including key concepts, scenario-based approaches to evaluation, planning, deployment and management, as well as the Test Lab Guides. You can also download video that illustrates the functionality in the Test Lab from the authors' blog http://blogs.technet.com.b.security_talk/. In addition, each chapter wraps up with an "Administrators Punch List," a bullet list summary of key concepts discussed in the chapter. | ||
500 | |a Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8. Test Lab Guides enable you to test everything before deploying live to your system | ||
630 | 0 | 4 | |a Microsoft Windows server |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Microsoft Windows server |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Operating systems (Computers) |2 fast | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Computer security | |
700 | 1 | |a Diogenes, Yuri |e Sonstige |4 oth | |
700 | 1 | |a Shinder, Debra Littlejohn |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597499804 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027751310 |
Datensatz im Suchindex
_version_ | 1804152907355914240 |
---|---|
any_adam_object | |
author | Shinder, Thomas W. |
author_facet | Shinder, Thomas W. |
author_role | aut |
author_sort | Shinder, Thomas W. |
author_variant | t w s tw tws |
building | Verbundindex |
bvnumber | BV042314319 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)841488677 (DE-599)BVBBV042314319 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04174nmm a2200529zc 4500</leader><controlfield tag="001">BV042314319</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499811</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-981-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499811</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-981-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499804</subfield><subfield code="9">978-1-59749-980-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499803</subfield><subfield code="9">1-59749-980-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)841488677</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314319</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shinder, Thomas W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Windows server 2012 security from end to edge and beyond</subfield><subfield code="b">architecting, designing, planning, and deploying Windows server 2012 security solutions</subfield><subfield code="c">Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Windows 8 Security from End to Edge and Beyond shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access. Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows security technologies and how you can deploy them effectively in both the traditional datacenter and in new cloud-based solutions. When you finish the book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features first in a Test Lab and then in pilot and production environments. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Windows 8 Security introduces the revolutionary "Test Lab Guide" approach to hands-on experiences with the security technologies discussed in the book. This approach enables you to test every subject covered in the book in a predefined Test Lab Environment. The combination of Test Lab experience with conceptual and deployment guidance enables you to understand the technologies in record time and move from Test Lab to production faster than ever before. Critical material is presented in a number of ways, including key concepts, scenario-based approaches to evaluation, planning, deployment and management, as well as the Test Lab Guides. You can also download video that illustrates the functionality in the Test Lab from the authors' blog http://blogs.technet.com.b.security_talk/. In addition, each chapter wraps up with an "Administrators Punch List," a bullet list summary of key concepts discussed in the chapter. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8. Test Lab Guides enable you to test everything before deploying live to your system</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft Windows server</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft Windows server</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Operating systems (Computers)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Diogenes, Yuri</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shinder, Debra Littlejohn</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597499804</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751310</subfield></datafield></record></collection> |
id | DE-604.BV042314319 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9781597499811 1597499811 9781597499804 1597499803 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751310 |
oclc_num | 841488677 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Elsevier |
record_format | marc |
spelling | Shinder, Thomas W. Verfasser aut Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder Amsterdam Elsevier 2013 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Windows 8 Security from End to Edge and Beyond shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access. Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows security technologies and how you can deploy them effectively in both the traditional datacenter and in new cloud-based solutions. When you finish the book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features first in a Test Lab and then in pilot and production environments. Windows 8 Security introduces the revolutionary "Test Lab Guide" approach to hands-on experiences with the security technologies discussed in the book. This approach enables you to test every subject covered in the book in a predefined Test Lab Environment. The combination of Test Lab experience with conceptual and deployment guidance enables you to understand the technologies in record time and move from Test Lab to production faster than ever before. Critical material is presented in a number of ways, including key concepts, scenario-based approaches to evaluation, planning, deployment and management, as well as the Test Lab Guides. You can also download video that illustrates the functionality in the Test Lab from the authors' blog http://blogs.technet.com.b.security_talk/. In addition, each chapter wraps up with an "Administrators Punch List," a bullet list summary of key concepts discussed in the chapter. Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8. Test Lab Guides enable you to test everything before deploying live to your system Microsoft Windows server COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Microsoft Windows server fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer security Diogenes, Yuri Sonstige oth Shinder, Debra Littlejohn Sonstige oth http://www.sciencedirect.com/science/book/9781597499804 Verlag Volltext |
spellingShingle | Shinder, Thomas W. Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions Microsoft Windows server COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Microsoft Windows server fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer security |
title | Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions |
title_auth | Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions |
title_exact_search | Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions |
title_full | Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder |
title_fullStr | Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder |
title_full_unstemmed | Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder |
title_short | Windows server 2012 security from end to edge and beyond |
title_sort | windows server 2012 security from end to edge and beyond architecting designing planning and deploying windows server 2012 security solutions |
title_sub | architecting, designing, planning, and deploying Windows server 2012 security solutions |
topic | Microsoft Windows server COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Microsoft Windows server fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer security |
topic_facet | Microsoft Windows server COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Operating systems (Computers) |
url | http://www.sciencedirect.com/science/book/9781597499804 |
work_keys_str_mv | AT shinderthomasw windowsserver2012securityfromendtoedgeandbeyondarchitectingdesigningplanninganddeployingwindowsserver2012securitysolutions AT diogenesyuri windowsserver2012securityfromendtoedgeandbeyondarchitectingdesigningplanninganddeployingwindowsserver2012securitysolutions AT shinderdebralittlejohn windowsserver2012securityfromendtoedgeandbeyondarchitectingdesigningplanninganddeployingwindowsserver2012securitysolutions |