Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781931836197
    Language: English
    Pages: 1 online resource (608 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market. * This book will provide readers with unparalleled information on installing, confiuguring, and troubleshooting ISA Server 2004 by teaching readers to: * Deploy ISA Server 2004 in small businesses and large organizations. * Learn how to configure complex DMZ configurations using ISA Server 2004's new network awareness features and built-in multinetworking capabilities. * Learn how to take advantage of ISA Server 2004's new VPN capabilities!
    Note: Online resource; Title from title page (viewed December 31, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781597499811 , 1597499811
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Microsoft Windows server ; Operating systems (Computers) ; Computer security ; Electronic books ; local ; Electronic books
    Abstract: Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments. The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors' blog http://blogs.technet.com.b.security_talk/. Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter. Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system Written by two Microsoft employees who provide an inside look at the security features of Windows 8 Test Lab Guides enable you to test everything before deploying live to your system
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Burlington, MA : Syngress Pub.
    ISBN: 9780080486994 , 0080486991
    Language: English
    Pages: 1 online resource (xii, 732 pages) , illustrations
    Edition: 2nd ed. , Michael Cross
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer crimes / Investigation ; Computer networks / Security measures ; Computer security ; Forensic sciences ; Computer security ; Computer networks / Security measures ; Computer crimes / Investigation ; Forensic sciences ; Computer networks / Security measures ; Computer crimes / Investigation ; Computer security ; Computer networks Security measures ; Computer crimes Investigation ; Forensic sciences ; Computersicherheit ; Computervirus ; Computervirus ; Computersicherheit
    Abstract: When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months.
    Abstract: Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard. Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless.
    Abstract: It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws. * Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations.
    Note: Previous edition: published as by Debra Littlejohn Shinder. 2002. - Includes index , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781932266603 , 1932266607 , 0080479251 , 9780080479255
    Language: English
    Pages: 1 online resource (xlv, 977 pages) , illustrations
    DDC: 004.076
    Keywords: Microsoft Windows server ; Microsoft Windows server ; Microsoft Windows server ; Electronic data processing personnel / Certification ; Microsoft software / Examinations / Study guides ; Client/server computing / Examinations / Study guides ; Client/server computing / Examinations ; Electronic data processing personnel / Certification ; Microsoft software / Examinations ; Electronic data processing personnel / Certification ; Microsoft software / Examinations / Study guides ; Client/server computing / Examinations / Study guides ; Electronic data processing personnel Certification ; Microsoft software Study guides Examinations ; Client/server computing Study guides Examinations
    Abstract: MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft 70-290 exam objectives plus test preparation software for the edge you need to pass the exam on your first try. In June, 2003 Microsoft will launch beta exams for the Windows Server 2003 certification line. Exams will likely go live the following August and September. This launch is a comprehensive revamping of the MCSE (Microsoft Certified System Enginner) track with all new core exams and all new electives. In addition, the MCSA (Microsoft Certified System Administrator) certification will expand its program to include an additional upgrade exam for MCSAs wanting to become MCSEs. The launch of this new certification track means that all current MCSEs, representing an installed base of approximately 200,000 (source: MCP Magazine) will need to recertify under Windows Server 2003. In addition, any MCP looking to become an MCSE--estimates are about 1.2 million (source: MCP Magazine)--will also have to continue their certifications under the new program. Many industry experts expect the Windows 2003 certification, and product line as well, to be a more popular track since many organziations are still using NT and plan to skip 2000 and go directly to 2003. * DVD Provides a "Virtual Classroom": Get the benefits of instructor led training at a fraction of the cost and hassle. * Guaranteed Coverage of All Exam Objectives: If the topic is listed in Microsoft's Exam 70-290 objectives, it is covered here. * Fully Integrated Learning: This system includes a study guide, DVD training and Web-based practice exams
    Note: Paralleltitel: MCSA/MCSE 70-290
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9781509304028 , 1509304029
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Windows Azure ; Application software ; Development ; Cloud computing ; Electronic books ; Electronic books ; local
    Abstract: Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure , three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services-and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement-so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: • Understand cloud security boundaries and responsibilities • Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection • Explore Azure's defense-in-depth security architecture • Use Azure network security patterns and best practices • Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security • Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines • Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information • Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite • Effectively model threats and plan protection for IoT systems • Use Azure security tools for operations, incident response, and forensic investigation
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed September 8, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress Publishing | Boston, Mass. :Safari Books Online,
    ISBN: 9781597491990 , 1597491993
    Language: English
    Pages: xxxiii, 637 p , ill. , 24 cm
    Keywords: Microsoft ISA server ; Firewalls (Computer security) ; Internet ; Security measures ; Systems migration ; Electronic books ; local ; Electronic books
    Abstract: Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. * Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006. * Learn to Publish Exchange Server 2007 Using ISA Server 2006. * Create a DMZ using ISA Server 2006. Dr. Tom Shinder's previous two books on configuring ISA Server have sold more than 50,000 units worldwide. Dr. Tom Shinder is a Microsoft Most Valuable Professional (MVP) for ISA Server and a member of the ISA Server beta testing team.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Language: English
    Pages: xxviii, 539 p. , ill. ; , 24 cm. +
    DDC: 005.8
    Keywords: Computer security ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Electronic books ; local
    Abstract: TICSA (TruSecure ICSA Computer Security Associate) is a popular new entry-level computer security certification aimed at individuals with 2 or more years of computer security experience or training equivalent to 48 hours in a 24 month period. TICSA represents base level certification, and is designed for system or network administrators responsible for security administration of systems or networks in an enterprise alongside their regular responsibilities. This first-tier certification recognizes that not all security professionals need to become security wizards to perform serious and effective security work. Que's Training Guides, which are endorsed by cramsessions.com as Cramsession Approved Study Material, are the most effective self-study guides in the marketplace, featuring exam tips, study strategies, practice exams, and many more valuable tools for test preparation. The CD features PrepLogic™ Practice Tests, Preview Edition. This product includes one complete PrepLogic Practice Test with approximately the same number of questions found on the actual vendor exam with full, detailed explanations of correct and incorrect answers.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1000 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: In keeping with past trends, full migration to this latest Microsoft Server Operating System will begin in earnest 12 months after its release, in mid-to-late 2004. This book will hit the market just as large enterprises begin the process of moving from Windows 2000 Server to Windows Server 2003. The title says everything you need to know about this book. No other book on the market combines this breadth and depth of coverage with the kind of product expertise and quality standard expected from Syngress. Every aspect of Planning, Installing, Configuring and Troubleshooting a Windows Server 2003 network is distilled and documented, with plenty of examples and illustrations. An unlike its competition, this is a book that was written from the ground up for Windows Server 2003. * Everything a System Administrator will ever need to know about running a Windows Server 2003 network. * This is the book that meets the needs of today's Windows Server 2003 professional. * Every aspect of Planning, Installing, Configuring and Troubleshooting a Windows Server 2003 network is distilled and documented, with plenty of examples and illustrations.
    Note: Online resource; Title from title page (viewed June 18, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...