<p><i>Windows Server 2012 Security from End to Edge and Beyond</i> shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify
Windows Server 2012 Security from End to Edge and Beyond. Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
โ Scribed by Thomas W. Shinder, Yuri Diogenes and Debra Littlejohn Shinder (Auth.)
- Publisher
- Syngress
- Year
- 2013
- Tongue
- English
- Leaves
- 524
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Content:
Front Matter, Pages i-ii
Copyright, Page iv
Acknowledgments, Pages xiii-xiv
About the Authors, Pages xv-xvii
About the Technical Editor, Page xix
Foreword, Pages xxi-xxii
Chapter 1 - Planning Platform Security, Pages 1-20
Chapter 2 - Planning Server Role in Windows Server 2012, Pages 21-48
Chapter 3 - Deploying Directory Services and Certificate Services, Pages 49-89
Chapter 4 - Deploying AD FS and AD RMS in Windows Server 2012, Pages 91-119
Chapter 5 - Patch Management with Windows Server 2012, Pages 121-148
Chapter 6 - Virtualization Security, Pages 149-185
Chapter 7 - Controlling Access to Your Environment with Authentication and Authorization, Pages 187-210
Chapter 8 - Endpoint Security, Pages 211-237
Chapter 9 - Secure Client Deployment with Trusted Boot and BitLocker, Pages 239-265
Chapter 10 - Mitigating Application's Vulnerabilities, Pages 267-288
Chapter 11 - Mitigating Network Vulnerabilities, Pages 289-339
Chapter 12 - Unified Remote Access and BranchCache, Pages 341-380
Chapter 13 - DirectAccess Deployment Scenarios, Pages 381-437
Chapter 14 - Protecting Legacy Remote Clients, Pages 439-490
Chapter 15 - Cloud Security, Pages 491-510
Index, Pages 511-520
๐ SIMILAR VOLUMES
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy
DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology wor