Thor's Microsoft Security Bible : A Collection of Practical Security Techniques

By: Mullen, Timothy ""Thor""Material type: TextTextSeries: eBooks on DemandPublisher: Saint Louis : Elsevier Science, 2014Description: 1 online resource (328 p.)ISBN: 9781597495738Subject(s): Computer networks -- Security measures | Computer security | Microsoft Windows (Computer file)Genre/Form: Electronic books.Additional physical formats: Print version:: Thor's Microsoft Security Bible : A Collection of Practical Security TechniquesDDC classification: 005.8 LOC classification: QA76.9Online resources: Click here to view this ebook.
Contents:
Front Cover; Thor's Microsoft® Security Bible: A Collection of Practical Security Techniques; Copyright; Contents; About the Author; Technical Editor; Introduction; Chapter 1: Securely Writing Web Proxy Log Data to SQL Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into TMG; Introduction; Scope and Considerations; Implementation; Securely Logging Data to SQL; Designing the Workflow; Execution; Summary; Chapter 2: Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with EFS a
IntroductionRSA and AES; Building the Web Application Structure; Accessing Remote Files; Security in Depth; Securing Access with WebDAV; Conclusion; Summary; Chapter 3: Analyzing and Blocking Malicious Traffic Based on Geolocation; Introduction; Research and Due Diligence; Implementing a Solution; Integrating with TMG; Summary; References; Creating an Externally Accessible Authenticated Proxy in a Secure Manner; Introduction; Build It and They Will Come; Summary; Chapter 5: The Creation and Maintenance of Low-Privileged Service Users (with a Focus on SQL); Introduction
Creating and Configuring Service User AccountsReal, Quantifiable Password Strength, and How to Measure It; Summary; References; Remote Security Log Collection in a Least Privilege Environment; Introduction; Log Fetcher Architecture; Accessing WMI; Show Me the Code!; Summary; Securing RDP; Introduction; General RDP Attacks and Mitigation; RDP Solutions Overview; Direct Access of Multiple RDP Hosts; RDG/TSG; RDP Host Security; RDWeb and RemoteApp; Workstation Host Considerations; Limiting Access with Source Port Access Rules; Show Me the Code!; Summary; Appendix A: List of Acronyms
Appendix B: Full List of Server 2008 Log via the WEVTUTIL Tool
Summary: <i>Thor's Microsoft®</i><i> Security Bible </i>provides a ""one-stop-shop"" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. <br><br><ul><li>Named the 2011 Best Systems Administration Book by <i>In
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.9 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=744017 Available EBL744017

Front Cover; Thor's Microsoft® Security Bible: A Collection of Practical Security Techniques; Copyright; Contents; About the Author; Technical Editor; Introduction; Chapter 1: Securely Writing Web Proxy Log Data to SQL Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into TMG; Introduction; Scope and Considerations; Implementation; Securely Logging Data to SQL; Designing the Workflow; Execution; Summary; Chapter 2: Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with EFS a

IntroductionRSA and AES; Building the Web Application Structure; Accessing Remote Files; Security in Depth; Securing Access with WebDAV; Conclusion; Summary; Chapter 3: Analyzing and Blocking Malicious Traffic Based on Geolocation; Introduction; Research and Due Diligence; Implementing a Solution; Integrating with TMG; Summary; References; Creating an Externally Accessible Authenticated Proxy in a Secure Manner; Introduction; Build It and They Will Come; Summary; Chapter 5: The Creation and Maintenance of Low-Privileged Service Users (with a Focus on SQL); Introduction

Creating and Configuring Service User AccountsReal, Quantifiable Password Strength, and How to Measure It; Summary; References; Remote Security Log Collection in a Least Privilege Environment; Introduction; Log Fetcher Architecture; Accessing WMI; Show Me the Code!; Summary; Securing RDP; Introduction; General RDP Attacks and Mitigation; RDP Solutions Overview; Direct Access of Multiple RDP Hosts; RDG/TSG; RDP Host Security; RDWeb and RemoteApp; Workstation Host Considerations; Limiting Access with Source Port Access Rules; Show Me the Code!; Summary; Appendix A: List of Acronyms

Appendix B: Full List of Server 2008 Log via the WEVTUTIL Tool

<i>Thor's Microsoft®</i><i> Security Bible </i>provides a ""one-stop-shop"" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. <br><br><ul><li>Named the 2011 Best Systems Administration Book by <i>In

Description based upon print version of record.

There are no comments on this title.

to post a comment.