Thor's Microsoft Security Bible : A Collection of Practical Security TechniquesMaterial type: TextSeries: eBooks on DemandPublisher: Saint Louis : Elsevier Science, 2014Description: 1 online resource (328 p.)ISBN: 9781597495738Subject(s): Computer networks -- Security measures | Computer security | Microsoft Windows (Computer file)Genre/Form: Electronic books.Additional physical formats: Print version:: Thor's Microsoft Security Bible : A Collection of Practical Security TechniquesDDC classification: 005.8 LOC classification: QA76.9Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.9 (Browse shelf)||http://uttyler.eblib.com/patron/FullRecord.aspx?p=744017||Available||EBL744017|
Front Cover; Thor's Microsoft® Security Bible: A Collection of Practical Security Techniques; Copyright; Contents; About the Author; Technical Editor; Introduction; Chapter 1: Securely Writing Web Proxy Log Data to SQL Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into TMG; Introduction; Scope and Considerations; Implementation; Securely Logging Data to SQL; Designing the Workflow; Execution; Summary; Chapter 2: Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with EFS a
IntroductionRSA and AES; Building the Web Application Structure; Accessing Remote Files; Security in Depth; Securing Access with WebDAV; Conclusion; Summary; Chapter 3: Analyzing and Blocking Malicious Traffic Based on Geolocation; Introduction; Research and Due Diligence; Implementing a Solution; Integrating with TMG; Summary; References; Creating an Externally Accessible Authenticated Proxy in a Secure Manner; Introduction; Build It and They Will Come; Summary; Chapter 5: The Creation and Maintenance of Low-Privileged Service Users (with a Focus on SQL); Introduction
Creating and Configuring Service User AccountsReal, Quantifiable Password Strength, and How to Measure It; Summary; References; Remote Security Log Collection in a Least Privilege Environment; Introduction; Log Fetcher Architecture; Accessing WMI; Show Me the Code!; Summary; Securing RDP; Introduction; General RDP Attacks and Mitigation; RDP Solutions Overview; Direct Access of Multiple RDP Hosts; RDG/TSG; RDP Host Security; RDWeb and RemoteApp; Workstation Host Considerations; Limiting Access with Source Port Access Rules; Show Me the Code!; Summary; Appendix A: List of Acronyms
Appendix B: Full List of Server 2008 Log via the WEVTUTIL Tool
<i>Thor's Microsoft®</i><i> Security Bible </i>provides a ""one-stop-shop"" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. <br><br><ul><li>Named the 2011 Best Systems Administration Book by <i>In
Description based upon print version of record.