Securing Citrix XenApp Server in the Enterprise. (Record no. 912280)

001 - CONTROL NUMBER
control field EBL405218
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
additional material characteristics a|||||s|||||||| ||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 800623|uuuuuuuuxx||||||s |||||||eng||
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780080569987
Terms of availability 113.31 (UA),75.54 (1U)
035 ## - SYSTEM CONTROL NUMBER
System control number (AU-PeEL)405218
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)808732875
040 ## - CATALOGING SOURCE
Original cataloging agency AU-PeEL
Language of cataloging eng
Transcribing agency AU-PeEL
Modifying agency AU-PeEL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.C55S369 2008
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.4476
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.9.C55S369 2008
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Azad, Tariq.
245 10 - TITLE STATEMENT
Title Securing Citrix XenApp Server in the Enterprise.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington :
Name of publisher, distributor, etc Elsevier Science,
Date of publication, distribution, etc 2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (768 p.)
490 0# - SERIES STATEMENT
Series statement eBooks on Demand
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Front Cover; Securing Citrix XenApp Server in the Enterprise; Copyright Page; Technical Editor; Contributors; Contents; Chapter 1: Introduction to Security; Introduction; Defining Security; Defining Risk; Defining Value; Defining Threat; Defining Vulnerability; Defining Countermeasures; You Really Can't Counter Threat; What Is a Security Program?; Optimizing Risk; Consciously Accept Risk; Understanding the Security Design Process; The CIA Triad; Why Does Your Organization Need a Security Infrastructure?; Analyzing Existing Security Policies and Procedures; Acceptable Use Policies
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Privacy versus SecuritySecurity versus Usability; Designing a Framework for Implementing Security; Predicting Threats to Your Network; Recognizing Internal Security Threats; Increasing Security Awareness; Recognizing External Threats; Denial-of-Service Attacks; Distributed Denial-of-Service Attacks; Viruses, Worms, and Trojan Horses; Software Vulnerabilities; Nontechnical Attacks; What Motivates External Attackers?; Implementing Risk Analysis; Addressing Risks to the Corporate Network; Analyzing Security Requirements for Different Types of Data
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Defining Best Practices for Designing Your Security FrameworkReviewing Compliancy; Citrix and HIPAA, Sarbanes-Oxley, FERPA; FIPS 40-2, FIPS 20 and HSPD- 2; Explaining Security Technologies; Digital Certificates; Cryptography; Auditing and Vulnerability Assessments; Assessment Types; Host Assessments; Network Assessments; Automated Assessments; Stand-Alone versus Subscription; Two Approaches; Administrative Approach; The Outsider Approach; The Hybrid Approach; Realistic Expectations; Defining Authentication Models; How Does the System Authenticate a User?; Kerberos
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Understanding the Kerberos Authentication ProcessSecure Sockets Layer/Transport Layer Security; NT LAN Manager; Digest Authentication; Passport Authentication; Multifactor Authentication Models; Passwords; Windows Password Policies; Smart Card; Token; Biometrics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2: Security Guidance for Operating Systems and Terminal Services; Introduction; Windows 2003 Basics; Kernel Protection Mechanisms; Disk File System Basics and Recommendations; NTFS; FAT 32; Creating, Using, and Maintaining Users and Groups in Windows 2003
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Local AccountsDomain Accounts; Windows 2003 Security Essentials; What Is Vulnerable in Windows 2003?; RUNAS Service; Files and Applications; Accounts Data; Providing Basic Security Levels in Windows 2003; Creating Security Templates; Analyzing Security Policy Templates and Machine Security Configuration; Installing and Checking Security Policy Templates; Attacking Windows 2003; System Identification Methods; Remote Enumeration; NetBIOS; SNMP; Probing; Local Enumeration; Authentication Attack Methods; Attacks Using Common and Known Vulnerabilities; Defending and Hardening Windows 2003
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Evaluate Your Needs and Current Status
520 ## - SUMMARY, ETC.
Summary, etc Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious
588 ## -
-- Description based upon print version of record.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Citrix MetaFrame. Client/server computing --Security measures. Computer security.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Client/server computing - Security measures.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Client/server computing.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Azad, Tariq
Title Securing Citrix XenApp Server in the Enterprise
Place, publisher, and date of publication Burlington : Elsevier Science,c2014
International Standard Book Number 9781597492812
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://uttyler.eblib.com/patron/FullRecord.aspx?p=405218">http://uttyler.eblib.com/patron/FullRecord.aspx?p=405218</a>
Link text Click here to view this ebook.
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN)
Platform EBL
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Book
Source of classification or shelving scheme
Holdings
Withdrawn status Lost item Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
          UT Tyler Online UT Tyler Online Online 11/30/2015   QA76.9.C55S369 2008 EBL405218 11/30/2015 http://uttyler.eblib.com/patron/FullRecord.aspx?p=405218 11/30/2015 Electronic Book