Microsoft® Windows server 2008 security resource kit / Jesper M Johansson, with the Microsoft Security Team.
Material type: TextPublication details: Redmond, Wash. : Microsoft Press, c2008Description: xxv, 476 p. : ill. ; 23 cm. + 1 CD-ROM (4 3/4 in.)ISBN: 9780735625044 (pbk.); 0735625042 (pbk.)Other title: Security resource kit | Windows server 2008 | Windows server 2008 securitySubject(s): Microsoft Windows server | Computer security | Computer networks -- Security measures | Firewalls (Computer security) | Windows (Computer programs)DDC classification: 005.8 LOC classification: QA76.9.A25 | J64 2008Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
General Circulation | APIIT Library CD-ROM Shelf | CD-ROM | CD-35-31 (Browse shelf (Opens below)) | 1 | Available (No use restrictions) | 00035456 | |
General Circulation | APIIT Library CD-ROM Shelf | CD-ROM | CD-35-31A (Browse shelf (Opens below)) | 2 | Available (No use restrictions) | 00035490 | |
General Circulation | APU Library Open Shelf | Book | QA76.9.A25 J64 2008 c.1 (Browse shelf (Opens below)) | 1 | Available (No use restrictions) | 00007250 | |
Staff Circulation | APU Library Open Shelf | Book | QA76.9.A25 J64 2008 c.2 (Browse shelf (Opens below)) | 2 | Available (No use restrictions) | 00007251 | |
General Circulation | APU Library Open Shelf | Book | QA76.9.A25 J64 2008 c.3 (Browse shelf (Opens below)) | 3 | Available (No use restrictions) | 00007252 |
Browsing APIIT Library shelves, Shelving location: CD-ROM Shelf, Collection: CD-ROM Close shelf browser (Hides shelf browser)
"Your definitive security resource for WIndows Server 2008--straight from the experts"--Back cover.
Includes bibliographical references and index.
Windows security fundamentals: Subjects, users, and other actors -- Authenticators and authentication protocols -- Objects: the stuff you want -- Understanding user account control (UAC) -- Firewall and network access protection -- Services -- Group policy -- Auditing. Implementing identity and access (IDA) control using active directory: Designing active directory domain services for security -- Implementing active directory certificate services. Common security scenarios: Securing server roles -- Patch management -- Securing the network -- Securing the branch office -- Small business considerations -- Securing server applications -- Index.
System requirements: 1 GHz 32 (x86) or 64-bit processor; depending on the minimum requirements of the operating system installed; 1 GB of system memory (depending on the minimum requirements of the operating system ; a hard disk with at least 1 GB of available space; video output; CD-ROM drive; Microsoft Windows Server 2008 or Windows Vista ; Windows PowerShell 1.x.
There are no comments on this title.