Cargando…
Microsoft Security Bible: A Collection of Practical Security Techniques
Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Serve...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier
2011
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1413996 |
_version_ | 1780923981796212736 |
---|---|
author | Mullen, Timothy "Thor" |
author_facet | Mullen, Timothy "Thor" |
author_sort | Mullen, Timothy "Thor" |
collection | CERN |
description | Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications |
id | cern-1413996 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2011 |
publisher | Elsevier |
record_format | invenio |
spelling | cern-14139962021-04-22T00:41:17Zhttp://cds.cern.ch/record/1413996engMullen, Timothy "Thor"Microsoft Security Bible: A Collection of Practical Security TechniquesComputing and ComputersThor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applicationsElsevieroai:cds.cern.ch:14139962011 |
spellingShingle | Computing and Computers Mullen, Timothy "Thor" Microsoft Security Bible: A Collection of Practical Security Techniques |
title | Microsoft Security Bible: A Collection of Practical Security Techniques |
title_full | Microsoft Security Bible: A Collection of Practical Security Techniques |
title_fullStr | Microsoft Security Bible: A Collection of Practical Security Techniques |
title_full_unstemmed | Microsoft Security Bible: A Collection of Practical Security Techniques |
title_short | Microsoft Security Bible: A Collection of Practical Security Techniques |
title_sort | microsoft security bible: a collection of practical security techniques |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1413996 |
work_keys_str_mv | AT mullentimothythor microsoftsecuritybibleacollectionofpracticalsecuritytechniques |