Real World Security Solutions for Microsoft Enterprise Networks.
First Statement of Responsibility
Syngress.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Rockland, MA
Name of Publisher, Distributor, etc.
Syngress Publishing
Date of Publication, Distribution, etc.
2003
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
(865 pages)
CONTENTS NOTE
Text of Note
Cover; Contents; Foreword and Acknowledgements; Chapter 1 Defending the Network with ISA Server-and Beyond; Chapter 2 Defense Plan 1: The Trihomed DMZ; Chapter 3 Defense Plan 2: The Back-to-Back DMZ; Chapter 4 Defense Plan 3: The Internal "Pseudo" DMZ; Chapter 5 Defense Plan 4: Advanced Server Publishing; Chapter 6 Defense Plan 5: Protecting Mail Services; Chapter 7 Understanding Windows Default Access Control Settings; Chapter 8 Using the Security Configuration Tool Set; Chapter 9 Defending Your Data with the Encrypting File System; Chapter 10 Protecting Data in Transit with IP Security. Chapter 11 Authenticating Users with Smart CardsChapter 12 Creating a Public Key Infrastructure with Certificate Services; Chapter 13 Keeping Your IIS Web Servers Safe; Appendix A Defending Your 802.11 Wireless Network; Index.
SUMMARY OR ABSTRACT
Text of Note
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." I.