![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
"Windows 2012 Server Network Security "provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting Windows network security is of primary importance due to the
sheer volume of data residing on Windows networks. "Windows 2012
Server Network Security "provides network administrators with the
most focused and in-depth coverage of Windows network security
threats along with methods and techniques for securing important
mission-critical networks and assets. The book also covers Windows
8.
As part of the Syngress Basics series, "The Basics of Cloud Computing "provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware of what it really means. This book helps readers understand what the cloud is and how to work with it, even if it isn t a part of their day-to-day responsibility. Authors Derrick Rountree and Ileana Castrilloexplains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud. The book will be presented as an introduction to the cloud, and reference will be made in the introduction to other Syngress cloud titles for readers who want to delve more deeply into the topic. This book gives readers a conceptual understanding and a
framework for moving forward with cloud computing, as opposed to
competing and related titles, which seek to be comprehensive guides
to the cloud. Provides a sound understanding of the cloud and how it works. Describes both cloud deployment models and cloud services models, so you can make the best decisions for deployment. Presents tips for selecting the best cloud services providers."
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In "Federated Identity Primer," Derrick Rountree Explains the concepts of digital identity Describes the technology behind and implementation of federated identity systems Helps you decide if federated identity is good for your system
or web service Learn about Internet authentication Learn about federated authentication Learn about ADFS 2.0 "
Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is divided into six chapters that cover details about network attacks, system failures, audits, and social networking. The book introduces general security concepts including the principles of information security, standards, regulation, and compliance; authentication, authorization, and accounting; and access control. It also covers the cryptography and the principles of network, system, and organizational and operational security, including risk analysis and disaster recovery. The last part of the book presents assessments and audits of information security, which involve methods of testing, monitoring, logging, and auditing. This handy guide offers IT practitioners, systems and network administrators, and graduate and undergraduate students in information technology the details they need about security concepts and issues. Non-experts or beginners in Windows systems security will also find this book helpful.
|
You may like...
(Re)Designing Programs - A Vision for…
Jennifer Jacobs, Rebecca West Burns
Hardcover
R2,770
Discovery Miles 27 700
Verification of Business Rules Programs
Bruno Berstel-Da Silva
Hardcover
Teacher Empowerment Toward Professional…
Ismail Hussein Amzat, Nena P Valdez
Hardcover
R4,395
Discovery Miles 43 950
Social Data Analytics - Collaboration…
Krish Krishnan, Shawn P Rogers
Paperback
R793
Discovery Miles 7 930
Principles of Statistical Inference from…
L. Pace, A. Salvan
Hardcover
R2,547
Discovery Miles 25 470
Casting the Runes - Occult Investigation…
Paul St. John Mackintosh
Hardcover
R1,021
Discovery Miles 10 210
|