• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
ISA server and beyond :

پدید آورنده
Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor.

موضوع
Microsoft ISA server.,Microsoft ISA server.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

رده
TK5105
.
59
.
S55
2002eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1931836663
(Number (ISBN
1932266402
(Number (ISBN
9781931836661
(Number (ISBN
9781932266405

NATIONAL BIBLIOGRAPHY NUMBER

Number
b711442

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
ISA server and beyond :
General Material Designation
[Book]
Other Title Information
real world security solutions for Microsoft enterprise networks /
First Statement of Responsibility
Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Rockland, MA :
Name of Publisher, Distributor, etc.
Syngress Pub.,
Date of Publication, Distribution, etc.
©2002.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xvi, 847 pages) :
Other Physical Details
illustrations

GENERAL NOTES

Text of Note
"Covers undocumented DMZ topologies, exchange server, and outlook web access"--Cover.
Text of Note
"Integrates ISA server with Windows 2000 permissions, IIS security, EFS, wireless security, and IPSec"--Cover.
Text of Note
Includes index.

CONTENTS NOTE

Text of Note
Chapter 1: Introduction -- Chapter 2: InfoWar: The 21st Century Battlefield -- Chapter 3: Network Security Fundamentals -- Chapter 4: Network Intrusions and Attacks -- Chapter 5: Creating complex IPSec Policies for intranet, extranet and Internet connectivity -- Chapter 6: Design and configure an enterprise Certificate Services -- Chapter 7: Windows Security Features -- Chapter 8: Design and configure an enterprise Certificate Services infrastructure -- Chapter 9: Design and configure PPTP and L2TP/IPSec VPNs -- Chapter 10: Building complex Mesh and Spoke and Hub VPN configurations -- Chapter 11: Design and configure secure Wireless networks -- Chapter 12: Design and configure Defense in Depth with Host based security strategies -- Chapter 13: Hardening IIS 4.0 5.0 and 6.0 -- Chapter 14: Secure common network services DNS, SNMP, WINS, DHCP and RADIUS -- Chapter 15: Conclusion.
0

SUMMARY OR ABSTRACT

Text of Note
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers. The only all-encompassing book on securing Microsoft networks. Windows NT, Windows 2000, Microsoft Internet Information Server (IIS), Microsoft Proxy Server, Microsoft Internet Security Accelerator, Microsoft Explorer are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks Invaluable CD provides the weapons to defend your network. The accompanying CD is packed with third party tools, utilities, and software to defend your network.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
eBook Library
Stock Number
EBL140400

OTHER EDITION IN ANOTHER MEDIUM

Title
ISA server and beyond.
International Standard Book Number
1931836663

PARALLEL TITLE PROPER

Parallel Title
Dr. Tom Shinder's

TITLE USED AS SUBJECT

Microsoft ISA server.
Microsoft ISA server.

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures.
Computer networks-- Security measures.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.

(SUBJECT CATEGORY (Provisional

COM-- 043050
COM-- 053000
COM-- 060040

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
21

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
59
Book number
.
S55
2002eb

PERSONAL NAME - PRIMARY RESPONSIBILITY

Shinder, Thomas W.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Grasdal, Martin.
Shinder, Debra Littlejohn.

ORIGINATING SOURCE

Date of Transaction
20201208020647.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival