Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781839216411
    Language: English
    Pages: 1 online resource (572 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Protect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutions Understand how to create cyber-threat defense solutions effectively Book Description Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you'll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you'll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment. What you will learn Understand baselining and learn the best practices for building a baseline Get to grips with identity management and access management on Windows-based systems Delve into the device administration and remote management of Windows-based systems Explore security tips to harden your Windows server and keep clients secure Audit, assess, and test to ensure controls are successfully applied and enforced Monitor and report activities to stay on top of vulnerabilities Who this book is for This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. A basic understanding of Windows security concepts, Intune, Configuration Manager, Windows PowerShell, and Microsoft Azure will help you get the best out of this book.
    Note: Online resource; Title from title page (viewed July 8, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781784393380 , 178439338X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Professional expertise distilled
    Keywords: Mobile commerce ; Security measures ; Mobile communication systems ; Management ; Mobile communication systems ; Access control ; Electronic books ; Electronic books ; local
    Abstract: Learn to implement, manage, and deploy the latest Enterprise Mobility Management (EMM) platform offered by AirWatch In Detail Nowadays, organizations are facing a critical challenge of providing reliable, efficient, and secure access to corporate information. With AirWatch by VMware's Enterprise Mobility Management platform, you will be able to set up and deploy access to corporate information securely from mobile devices, allowing security policies and regulations to meet compliance for your business. This book will guide you through a detailed overview on how to set up AirWatch by VMware, administer the deployment, manage enterprise integrations, and configure security controls and many more options available for effective EMM deployments in enterprises. Each of the components of EMM is explained in the book in a way that you can apply your knowledge in the best possible manner while working with your mobile deployments. What You Will Learn Set up your working environment with the options provided by AirWatch Understand the administration console and learn to manage your EMM platform Integrate AirWatch by VMware into your corporate infrastructure Secure your EMM deployment to meet the security and regulation standards Learn to set up and configure Mobile Device Management (MDM) for your mobile devices Discover how to set up and deploy Mobile Containerization and the use cases it can be used for Deploy Mobile E-mail Management (MEM) to allow you to access e-mails securely Configure Mobile Application Management (MAM) and Mobile Browser Management (MBM)
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed April 14, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781803236544
    Language: English
    Pages: 1 online resource (816 pages) , color illustrations
    Edition: Second edition.
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Operating systems (Computers) ; Microsoft Windows (Computer file) ; Computer security ; Operating systems (Computers) ; Electronic books
    Abstract: A comprehensive guide to administering and protecting the latest Windows 11 and Windows server operating system from ongoing cyber threats using zero-trust security principles Key Features Learn to protect your Windows environment using zero-trust and a multi-layered security approach Implement security controls using Intune, Configuration Manager, Defender for Endpoint, and more Understand how to onboard modern cyber-threat defense solutions for Windows clients Book Description Are you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain the expertise to implement efficient security measures and create robust defense solutions using modern technologies. The first part of the book covers security fundamentals with details around building and implementing baseline controls. As you advance, you'll learn how to effectively secure and harden your Windows-based systems through hardware, virtualization, networking, and identity and access management (IAM). The second section will cover administering security controls for Windows clients and servers with remote policy management using Intune, Configuration Manager, Group Policy, Defender for Endpoint, and other Microsoft 365 and Azure cloud security technologies. In the last section, you'll discover how to protect, detect, and respond with security monitoring, reporting, operations, testing, and auditing. By the end of this book, you'll have developed an understanding of the processes and tools involved in enforcing security controls and implementing zero-trust security principles to protect Windows systems. What you will learn Build a multi-layered security approach using zero-trust concepts Explore best practices to implement security baselines successfully Get to grips with virtualization and networking to harden your devices Discover the importance of identity and access management Explore Windows device administration and remote management Become an expert in hardening your Windows infrastructure Audit, assess, and test to ensure controls are successfully applied and enforced Monitor and report activities to stay on top of vulnerabilities Who this book is for If you're a cybersecurity or technology professional, solutions architect, systems engineer, systems administrator, or anyone interested in learning how to secure the latest Windows-based systems, this book is for you. A basic understanding of Windows security concepts, Intune, Configuration Manager, Windows PowerShell, and Microsoft Azure will help you get the best out of this book.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...