Securing Windows Server 2008 : (Record no. 911682)

001 - CONTROL NUMBER
control field EBL349676
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
additional material characteristics m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr -n---------
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151119s2014||||||| s|||||||||||eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780080569970
Terms of availability 113.31 (UA),75.54 (1U)
035 ## - SYSTEM CONTROL NUMBER
System control number (AU-PeEL)349676
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)476166651
040 ## - CATALOGING SOURCE
Original cataloging agency AU-PeEL
Language of cataloging eng
Transcribing agency AU-PeEL
Modifying agency AU-PeEL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25 S37565 2008
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.9.A25 S37565 2008
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Tiensivu, Aaron.
245 10 - TITLE STATEMENT
Title Securing Windows Server 2008 :
Remainder of title Prevent Attacks from Outside and Inside Your Organization
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington :
Name of publisher, distributor, etc Elsevier Science,
Date of publication, distribution, etc 2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (422 p.)
490 0# - SERIES STATEMENT
Series statement eBooks on Demand
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Front Cover; Securing Windows Server 2008; Copyright page; Contributing Authors'; Contents; Chapter 1: Microsoft Windows Server 2008: An Overview; Introduction; Server Manager; Using Server Manager to Implement Roles; Server Core; Using Server Core and Active Directory; What Is Server Core?; Uses for Server Core; Active Directory Certificate Services; Configuring a Certificate Authority; Certificate Authorities; Standard vs. Enterprise; Root vs. Subordinate Certificate Authorities; Certificate Requests; Request a Certificate from a Web Server; Certificate Practice Statement; Key Recovery
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Active Directory Domain ServicesWhat Is New in the AD DS Installation?; Summary; Solutions Fast Track; Server Manager; Server Core; Active Directory Certificate Services; Active Directory Domain Services; Frequently Asked Questions; Chapter 2: Microsoft Windows Server 2008: PKI-Related Additions; Introduction; What Is PKI?; The Function of the PKI; Components of PKI; How PKI Works; PKCS Standards; Public Key Functionality; Digital Signatures; Authentication; Secret Key Agreement via Public Key; Bulk Data Encryption without Prior Shared Secrets; Digital Certificates; User Certificates
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine CertificatesApplication Certificates; Working with Certificate Services; Backing Up Certificate Services; Restoring Certificate Services; Assigning Roles; Enrollments; Revocation; Working with Templates; General Properties; Request Handling; Cryptography; Subject Name; Issuance Requirements; Security; Types of Templates; User Certificate Types; Computer Certificate Types; Other Certificate Types; Custom Certificate Templates; Creating a Custom Template; Securing Permissions; Versioning; Key Recovery Agent; Summary; Solutions Fast Track; What Is PKI?; Digital Certificates
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Working with Certificate ServicesWorking with Templates; Creating a Custom Template; Frequently Asked Questions; Chapter 3: Microsoft Windows Server 2008: Active Directory Domain; Introduction; Configuring Audit Policies; Logon Events; Directory Service Access; Configuring Directory Service Access Auditing in Group Policy; Configuring Active Directory Object Auditing; Fine-Grain Password and Account Lockout Policies; Configuring a Fine-Grain Password Policy; Applying Users and Groups to a PSO with Active Directory Users and Computers; Read-Only Domain Controllers (RODCs); Introduction to RODC
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note An RODC's Purpose in LifeRODC Features; Configuring RODC; Removing an RODC; Digital Rights Management Service; Summary; Solutions Fast Track; Configuring Audit Policies; Fine-Grain Password and Account Lockout Policies; Read-Only Domain Controllers (RODCs); Configuring Active Directory Rights Management Services; Frequently Asked Questions; Chapter 4: Microsoft Windows Server 2008: Network Security Changes; Introduction; Network Policy Server; Configuring Policies and Settings for NAP Enforcement Methods in NPS; Network Policy and Access Services Role; NTLMv2 and Kerberos Authentication
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 802.1x Wired and Wireless Access
520 ## - SUMMARY, ETC.
Summary, etc Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as ""the most secure Windows Server ever"". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of a
588 ## -
-- Description based upon print version of record.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Microsoft Windows server.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Tiensivu, Aaron
Title Securing Windows Server 2008 : Prevent Attacks from Outside and Inside Your Organization
Place, publisher, and date of publication Burlington : Elsevier Science,c2014
International Standard Book Number 9781597492805
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://uttyler.eblib.com/patron/FullRecord.aspx?p=349676">http://uttyler.eblib.com/patron/FullRecord.aspx?p=349676</a>
Link text Click here to view this ebook.
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN)
Platform EBL
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Book
Source of classification or shelving scheme
Holdings
Withdrawn status Lost item Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
          UT Tyler Online UT Tyler Online Online 11/30/2015   QA76.9.A25 S37565 2008 EBL349676 11/30/2015 http://uttyler.eblib.com/patron/FullRecord.aspx?p=349676 11/30/2015 Electronic Book