Thor's Microsoft security bible a collection of practical security techniques
Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG) -- Chapter 2. Internet Information Server (IIS) Authentication and Authoriz...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Amsterdam u.a.
Elsevier/Syngress
c 2011
|
Schlagworte: | |
Online Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG) -- Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV) -- Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation -- Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner -- Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL) -- Chapter 6. Remote Security Log Collection in a Least Privilege Environment -- Chapter 7. Securing RDP -- Appendix A: List Of Acronyms -- Appendix B: Full list of Server 2008 logs via WEVTUTIL tool. "Thor's Microsoft Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code" - Syngress website |
---|---|
Beschreibung: | XI, 315 S. Ill., graph. Darst. 1 CD-ROM (12 cm) |
ISBN: | 9781597495721 978-1-59749-572-1 |