Ebook847 pages15 hours
Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks
By Syngress
Rating: 0 out of 5 stars
()
About this ebook
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task.
Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers.
The only all-encompassing book on securing Microsoft networks.
· Windows NT, Windows 2000, Microsoft Internet Information Server (IIS), Microsoft Proxy Server, Microsoft Internet Security Accelerator, Microsoft Explorer are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks
Invaluable CD provides the weapons to defend your network.
· The accompanying CD is packed with third party tools, utilities, and software to defend your network.
Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers.
The only all-encompassing book on securing Microsoft networks.
· Windows NT, Windows 2000, Microsoft Internet Information Server (IIS), Microsoft Proxy Server, Microsoft Internet Security Accelerator, Microsoft Explorer are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks
Invaluable CD provides the weapons to defend your network.
· The accompanying CD is packed with third party tools, utilities, and software to defend your network.
Read more from Syngress
Security + Study Guide and DVD Training System Rating: 4 out of 5 stars4/5Designing A Wireless Network Rating: 5 out of 5 stars5/5Configuring Cisco Voice Over IP Rating: 4 out of 5 stars4/5IP Addressing and Subnetting INC IPV6: Including IPv6 Rating: 0 out of 5 stars0 ratingsStealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Bluetooth Application Developer's Guide Rating: 4 out of 5 stars4/5SSCP Systems Security Certified Practitioner Study Guide and DVD Training System Rating: 0 out of 5 stars0 ratingsThe Best Damn Firewall Book Period Rating: 5 out of 5 stars5/5Building a Cisco Wireless Lan Rating: 5 out of 5 stars5/5Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks Rating: 4 out of 5 stars4/5ASP.Net Web Developer's Guide Rating: 0 out of 5 stars0 ratingsHack Proofing Your Identity In The Information Age Rating: 4 out of 5 stars4/5DBAs Guide to Databases Under Linux Rating: 0 out of 5 stars0 ratingsThe Best Damn Cisco Internetworking Book Period Rating: 5 out of 5 stars5/5Administering Cisco QoS in IP Networks: Including CallManager 3.0, QoS, and uOne Rating: 0 out of 5 stars0 ratingsSecurity Assessment: Case Studies for Implementing the NSA IAM Rating: 3 out of 5 stars3/5Building DMZs For Enterprise Networks Rating: 4 out of 5 stars4/5Cisco Security Professional's Guide to Secure Intrusion Detection Systems Rating: 0 out of 5 stars0 ratingsCisco Security Specialists Guide to PIX Firewall Rating: 5 out of 5 stars5/5Scene of the Cybercrime: Computer Forensics Handbook Rating: 4 out of 5 stars4/5Firewall Policies and VPN Configurations Rating: 0 out of 5 stars0 ratingsConfiguring Symantec AntiVirus Enterprise Edition Rating: 0 out of 5 stars0 ratingsSpecial Ops: Host and Network Security for Microsoft Unix and Oracle Rating: 4 out of 5 stars4/5Ruby Developers Guide Rating: 3 out of 5 stars3/5Designing SQL Server 2000 Databases Rating: 0 out of 5 stars0 ratingsManaging Cisco Network Security 2E Rating: 0 out of 5 stars0 ratingsWindows 2000 Configuration Wizards Rating: 0 out of 5 stars0 ratings
Related to Dr Tom Shinder's ISA Server and Beyond
Related ebooks
Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks Rating: 0 out of 5 stars0 ratingsThe Best Damn Firewall Book Period Rating: 2 out of 5 stars2/5Configuring and Troubleshooting Windows XP Professional Rating: 0 out of 5 stars0 ratingsPerfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Configuring Citrix MetaFrame XP for Windows: Including Feature Release 1 Rating: 0 out of 5 stars0 ratingsConfiguring Windows 2000 without Active Directory Rating: 0 out of 5 stars0 ratingsConfiguring ISA Server 2000: Building Firewalls for Windows 2000 Rating: 0 out of 5 stars0 ratingsConfiguring SonicWALL Firewalls Rating: 0 out of 5 stars0 ratingsBuilding DMZs For Enterprise Networks Rating: 4 out of 5 stars4/5Cisco Security Specialists Guide to PIX Firewall Rating: 5 out of 5 stars5/5Building CISCO Networks for Windows 2000 Rating: 0 out of 5 stars0 ratingsHow to Cheat at Managing Windows Server Update Services Rating: 0 out of 5 stars0 ratingsConfiguring Symantec AntiVirus Enterprise Edition Rating: 0 out of 5 stars0 ratingsHow to Cheat at Microsoft Vista Administration Rating: 0 out of 5 stars0 ratingsHow to Cheat at Designing Security for a Windows Server 2003 Network Rating: 2 out of 5 stars2/5CheckPoint NG VPN 1/Firewall 1: Advanced Configuration and Troubleshooting Rating: 5 out of 5 stars5/5Biz Talk Server 2000 Developer's Guide Rating: 0 out of 5 stars0 ratingsNokia Network Security Solutions Handbook Rating: 0 out of 5 stars0 ratingsHow to Cheat at Managing Microsoft Operations Manager 2005 Rating: 0 out of 5 stars0 ratingsConfiguring IPv6 For Cisco IOS Rating: 0 out of 5 stars0 ratingsThe Best Damn Cisco Internetworking Book Period Rating: 5 out of 5 stars5/5Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit Rating: 1 out of 5 stars1/5Configuring Check Point NGX VPN-1/Firewall-1 Rating: 0 out of 5 stars0 ratingsMicrosoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool Rating: 5 out of 5 stars5/5Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat Rating: 4 out of 5 stars4/5Configuring Cisco AVVID Rating: 0 out of 5 stars0 ratingsAsterisk Hacking Rating: 0 out of 5 stars0 ratingsHack Proofing Windows 2000 Server Rating: 0 out of 5 stars0 ratingsManaging Cisco Network Security 2E Rating: 0 out of 5 stars0 ratingsSecure Your Network for Free Rating: 5 out of 5 stars5/5
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsSecurity+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5
Reviews for Dr Tom Shinder's ISA Server and Beyond
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Dr Tom Shinder's ISA Server and Beyond - Syngress
Enjoying the preview?
Page 1 of 1