Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
"Windows Server 2012 Security from End to Edge and Beyond" shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments. The book's revolutionary "Test Lab Guide" approach lets you test
every subject in a predefined test lab environment. This, combined
with conceptual and deployment guidance, enables you to understand
the technologies and move from lab to production faster than ever
before. Critical material is also presented in key concepts and
scenario-based approaches to evaluation, planning, deployment, and
management. Videos illustrating the functionality in the Test Lab
can be downloaded from the authors blog http:
//blogs.technet.com.b.security_talk/. Each chapter wraps up with a
bullet list summary of key concepts discussed in the chapter.
How to Cheat at Configuring ISA (Internet Security and
Acceleration) Server 2004 meets the needs of system administrators
for a concise, step-by-step guide to getting one of Microsoft's
most complex server products up and running. While books twice its
size may be perfect for network designers and security specialists,
this is written for the person in the trenches actually running the
network day to day.
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear,
concise, and thorough path to migrate from previous versions of ISA
Server to ISA Server 2006. ISA Server 2006 is an incremental
upgrade from ISA Server 2004, this book provides all of the tips
and tricks to perform a successful migration, rather than rehash
all of the features which were rolled out in ISA Server 2004. Also,
learn to publish Exchange Server 2007 with ISA 2006 and to build a
DMZ.
The Second Edition of the Best Damn Firewall Book Period is
completely revised and updated to include all of the most recent
releases from Microsoft, Cisco, Juniper Network, and Check Point.
Dr. Tom and Debra Shinder have become synonymous with Microsoft's
flagship firewall product ISA Server, as a result of Tom's
prominent role as a member of the beta development team, and Tom
and Deb's featured placement on both Microsoft's ISA Server Web
site and ISAserver.org. Tom and Deb's book on the first release of
the product "Configuring ISA Server 2000" dominated the ISA Server
2000 book market having sold over 40,000 copies worldwide, and the
ISA Server community is eagerly awaiting Tom and Deb's book on ISA
Server 2004, which is the dramatically upgraded new release from
Microsoft.
|
You may like...
|