Normal view MARC view ISBD view

Windows server 2012 security from end to edge and beyond : architecting, designing, planning, and deploying Windows server 2012 security solutions / Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder.

By: Shinder, Thomas W.
Contributor(s): Diogenes, Yuri | Shinder, Debra Littlejohn.
Material type: TextTextSeries: Elsevier ScienceDirect eBooks.Publisher: Amsterdam : Elsevier, 2013Description: 1 online resource.ISBN: 9781597499811 (electronic bk.); 1597499811 (electronic bk.).Subject(s): Microsoft Windows server | Operating systems (Computers) | Computer securityAdditional physical formats: Print version:: Windows server 2012 security from end to edge and beyond.DDC classification: 005.8 Online resources: Click here to view this ebook. Summary: Windows 8 Security from End to Edge and Beyond shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access. Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows security technologies and how you can deploy them effectively in both the traditional datacenter and in new cloud-based solutions. When you finish the book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features first in a Test Lab and then in pilot and production environments. Windows 8 Security introduces the revolutionary "Test Lab Guide" approach to hands-on experiences with the security technologies discussed in the book. This approach enables you to test every subject covered in the book in a predefined Test Lab Environment. The combination of Test Lab experience with conceptual and deployment guidance enables you to understand the technologies in record time and move from Test Lab to production faster than ever before. Critical material is presented in a number of ways, including key concepts, scenario-based approaches to evaluation, planning, deployment and management, as well as the Test Lab Guides. You can also download video that illustrates the functionality in the Test Lab from the authors' blog http://blogs.technet.com.b.security_talk/. In addition, each chapter wraps up with an "Administrators Punch List," a bullet list summary of key concepts discussed in the chapter. Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8. Test Lab Guides enable you to test everything before deploying live to your system.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.774.M434 S55 2013eb (Browse shelf) https://ezproxy.uttyler.edu/login?url=http://www.sciencedirect.com/science/book/9781597499804 Available ocn841488677

Includes bibliographical references and index.

Windows 8 Security from End to Edge and Beyond shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access. Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows security technologies and how you can deploy them effectively in both the traditional datacenter and in new cloud-based solutions. When you finish the book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features first in a Test Lab and then in pilot and production environments. Windows 8 Security introduces the revolutionary "Test Lab Guide" approach to hands-on experiences with the security technologies discussed in the book. This approach enables you to test every subject covered in the book in a predefined Test Lab Environment. The combination of Test Lab experience with conceptual and deployment guidance enables you to understand the technologies in record time and move from Test Lab to production faster than ever before. Critical material is presented in a number of ways, including key concepts, scenario-based approaches to evaluation, planning, deployment and management, as well as the Test Lab Guides. You can also download video that illustrates the functionality in the Test Lab from the authors' blog http://blogs.technet.com.b.security_talk/. In addition, each chapter wraps up with an "Administrators Punch List," a bullet list summary of key concepts discussed in the chapter. Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8. Test Lab Guides enable you to test everything before deploying live to your system.

Description based on print version record.

There are no comments for this item.

Log in to your account to post a comment.