Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments. The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors’ blog http://blogs.technet.com.b.security_talk/. Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter. Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system Written by two Microsoft employees who provide an inside look at the security features of Windows 8 Test Lab Guides enable you to test everything before deploying live to your system
He is also a coauthor of Windows Server 2012 Security from End to Edge and Beyond from Syngress, Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion by Microsoft Press, as well as three other books about ...
By the end of this book, you'll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations ...
This book starts off with a detailed focus on forests, domains, trusts, schemas and partitions. Next, you learn how to manage domain controllers, organizational units and the default containers.
Fully updated for Windows Server 2012 R2! Prepare for Microsoft Exam 70-410 - and help demonstrate your real-world mastery of implementing and configuring core services in Windows Server 2012 R2. Designed for experienced IT professionals ...
The remaining chapters discuss how to secure Windows 7, as well as how to troubleshoot it. This book will serve as a reference and guide for those who want to utilize Windows 7.
Explores the architecture, components, and tools of Microsoft Dynamics AX 2012 R3, including forms, security, SharePoint integration, workflow infrastructure, reporting, automating tasks and document distribution, and application domain ...
Who this book is written for This book is for SQL Server administrators, developers, and consultants who want to secure their SQL Server database with cutting edge techniques for data and code encryption, user authentication and ...
Based on Technical Preview 4, John McCabe and the Windows Server team introduce the new features and capabilities, with practical insights on how Windows Server 2016 can meet the needs of your business.
Integration of IBM Tivoli Directory Server for z/OS into the IBM Workload Manager environment is also covered. This publication also provides detailed information about the configuration of IBM Tivoli Directory Server for z/OS.