Thor's Microsoft security bible: a collection of practical security techniques
Thor's Microsoftʼ Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Serve...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
© 2011
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Thor's Microsoftʼ Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases Reference-style content for access to specific application security techniques and methods Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so DVD Companion disk with source code, tools, video tutorials, and other materials |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xi, 315 pages) |
ISBN: | 9781597495721 1597495727 9781597495738 1597495735 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125633 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597495721 |9 978-1-59749-572-1 | ||
020 | |a 1597495727 |9 1-59749-572-7 | ||
020 | |a 9781597495738 |9 978-1-59749-573-8 | ||
020 | |a 1597495735 |9 1-59749-573-5 | ||
035 | |a (ZDB-33-ESD)ocn744636958 | ||
035 | |a (OCoLC)744636958 | ||
035 | |a (DE-599)BVBBV046125633 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Mullen, Timothy M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Thor's Microsoft security bible |b a collection of practical security techniques |c Timothy Mullen |
264 | 1 | |a Waltham, MA |b Syngress |c © 2011 | |
300 | |a 1 online resource (xi, 315 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Thor's Microsoftʼ Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases Reference-style content for access to specific application security techniques and methods Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so DVD Companion disk with source code, tools, video tutorials, and other materials | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security |v Handbooks, manuals, etc | |
650 | 4 | |a Microsoft software |x Security measures |v Handbooks, manuals, etc | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495721 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031506086 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597495721 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180444944531456 |
---|---|
any_adam_object | |
author | Mullen, Timothy M. |
author_facet | Mullen, Timothy M. |
author_role | aut |
author_sort | Mullen, Timothy M. |
author_variant | t m m tm tmm |
building | Verbundindex |
bvnumber | BV046125633 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn744636958 (OCoLC)744636958 (DE-599)BVBBV046125633 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02724nmm a2200433zc 4500</leader><controlfield tag="001">BV046125633</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495721</subfield><subfield code="9">978-1-59749-572-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495727</subfield><subfield code="9">1-59749-572-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495738</subfield><subfield code="9">978-1-59749-573-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495735</subfield><subfield code="9">1-59749-573-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn744636958</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)744636958</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125633</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mullen, Timothy M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Thor's Microsoft security bible</subfield><subfield code="b">a collection of practical security techniques</subfield><subfield code="c">Timothy Mullen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xi, 315 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Thor's Microsoftʼ Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases Reference-style content for access to specific application security techniques and methods Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so DVD Companion disk with source code, tools, video tutorials, and other materials</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft software</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495721</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506086</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597495721</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046125633 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:52Z |
institution | BVB |
isbn | 9781597495721 1597495727 9781597495738 1597495735 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506086 |
oclc_num | 744636958 |
open_access_boolean | |
physical | 1 online resource (xi, 315 pages) |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress |
record_format | marc |
spelling | Mullen, Timothy M. Verfasser aut Thor's Microsoft security bible a collection of practical security techniques Timothy Mullen Waltham, MA Syngress © 2011 1 online resource (xi, 315 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Thor's Microsoftʼ Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases Reference-style content for access to specific application security techniques and methods Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so DVD Companion disk with source code, tools, video tutorials, and other materials COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security Handbooks, manuals, etc Microsoft software Security measures Handbooks, manuals, etc http://www.sciencedirect.com/science/book/9781597495721 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Mullen, Timothy M. Thor's Microsoft security bible a collection of practical security techniques COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security Handbooks, manuals, etc Microsoft software Security measures Handbooks, manuals, etc |
title | Thor's Microsoft security bible a collection of practical security techniques |
title_auth | Thor's Microsoft security bible a collection of practical security techniques |
title_exact_search | Thor's Microsoft security bible a collection of practical security techniques |
title_full | Thor's Microsoft security bible a collection of practical security techniques Timothy Mullen |
title_fullStr | Thor's Microsoft security bible a collection of practical security techniques Timothy Mullen |
title_full_unstemmed | Thor's Microsoft security bible a collection of practical security techniques Timothy Mullen |
title_short | Thor's Microsoft security bible |
title_sort | thor s microsoft security bible a collection of practical security techniques |
title_sub | a collection of practical security techniques |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security Handbooks, manuals, etc Microsoft software Security measures Handbooks, manuals, etc |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Computer security Handbooks, manuals, etc Microsoft software Security measures Handbooks, manuals, etc |
url | http://www.sciencedirect.com/science/book/9781597495721 |
work_keys_str_mv | AT mullentimothym thorsmicrosoftsecuritybibleacollectionofpracticalsecuritytechniques |