๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Windows Server 2012 Security from End to Edge and Beyond. Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

โœ Scribed by Thomas W. Shinder, Yuri Diogenes and Debra Littlejohn Shinder (Auth.)


Publisher
Syngress
Year
2013
Tongue
English
Leaves
524
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Content:
Front Matter, Pages i-ii
Copyright, Page iv
Acknowledgments, Pages xiii-xiv
About the Authors, Pages xv-xvii
About the Technical Editor, Page xix
Foreword, Pages xxi-xxii
Chapter 1 - Planning Platform Security, Pages 1-20
Chapter 2 - Planning Server Role in Windows Server 2012, Pages 21-48
Chapter 3 - Deploying Directory Services and Certificate Services, Pages 49-89
Chapter 4 - Deploying AD FS and AD RMS in Windows Server 2012, Pages 91-119
Chapter 5 - Patch Management with Windows Server 2012, Pages 121-148
Chapter 6 - Virtualization Security, Pages 149-185
Chapter 7 - Controlling Access to Your Environment with Authentication and Authorization, Pages 187-210
Chapter 8 - Endpoint Security, Pages 211-237
Chapter 9 - Secure Client Deployment with Trusted Boot and BitLocker, Pages 239-265
Chapter 10 - Mitigating Application's Vulnerabilities, Pages 267-288
Chapter 11 - Mitigating Network Vulnerabilities, Pages 289-339
Chapter 12 - Unified Remote Access and BranchCache, Pages 341-380
Chapter 13 - DirectAccess Deployment Scenarios, Pages 381-437
Chapter 14 - Protecting Legacy Remote Clients, Pages 439-490
Chapter 15 - Cloud Security, Pages 491-510
Index, Pages 511-520


๐Ÿ“œ SIMILAR VOLUMES


Windows Server 2012 Security from End to
โœ Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Syngress ๐ŸŒ English

<p><i>Windows Server 2012 Security from End to Edge and Beyond</i> shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify

Windows Server 2012 Security from End to
โœ Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Syngress ๐ŸŒ English

Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy

Windows Server 2012 Security from End to
โœ Thomas W Shinder ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› SYNGRESS ๐ŸŒ English

Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy

Windows Server 2012 Security from End to
โœ Thomas W Shinder ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› SYNGRESS ๐ŸŒ English

Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy

Windows Server 2012 Unified Remote Acces
โœ Erez Ben-Ari, Bala Natarajan ๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› Packt Publishing ๐ŸŒ English

DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology wor