Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit. Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP application
Firewalls (Computer security) --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Computer networks --- Information Technology --- General and Others
Choose an application
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows ""security book."" I
Monograph --- Client/server computing. --- Web servers. --- Servers, Web --- Webservers --- World Wide Web servers --- WWW servers --- Client/server computing --- Cookies (Computer science) --- Web hosting --- Computing, Client/server --- Electronic data processing --- Equipment and supplies --- Distributed processing
Choose an application
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product ""Configuring ISA Server 2000"" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.<
Firewalls (Computer security) --- Computer security. --- Computer networks --- Security measures. --- Microsoft ISA server.
Choose an application
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft
Computer security. --- Operating systems (Computers). --- Operating systems (Computers) --- Microsoft Windows server. --- Information Technology --- General and Others --- Computer networks --- Database security. --- Security measures. --- Data base security --- Databases --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection --- Windows server --- Microsoft Windows 2000 server --- Windows server 2003 --- Windows Home Server --- Microsoft Windows Home Server --- Microsoft Windows NT server --- Computer operating systems --- Disk operating systems --- Systems software --- Operating systems
Choose an application
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ.* Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.* Learn to Publish Exchange
Firewalls (Computer security) --- Internet --- Systems migration. --- Security measures. --- Microsoft ISA server. --- Information systems migration --- Migration, Systems --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- ISA server --- Systems engineering --- Computer networks --- Security measures --- Information Technology --- General and Others
Choose an application
Microsoft's flagship ISA Server delivers the Internet to your customers!As the demand for Internet connectivity reaches a fever pitch, system administrators are being challenged to connect more and more systems to the Internet without compromising security or network performance. ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and speed.Written by best-selling author of several MCSE 2000 study guides, this book will provide the system administrators
Choose an application
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product ""Configuring ISA Server 2000"" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.<
Firewalls (Computer security) --- Computer security. --- Computer networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Security measures. --- Protection --- Security measures --- Microsoft ISA server. --- ISA server
Choose an application
This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ,
Firewalls (Computer security) --- Computer networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Security measures. --- Security measures
Choose an application
Syngress Study Guides guarantee comprehensive coverage of all exam objectives. There are no longer any short cuts or gimmicks that allow candidates to pass Microsoft's new, more rigorous exams. The days of cramming to become a ""paper MCSE"" are over; candidates must have a full grasp of all core concepts and plenty of hands-on experience to become certified. This book provides complete coverage of Microsoft Exam 70-291 and features one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation, this study guide & DVD training system gives
Electronic data processing personnel --- Microsoft software --- Certification. --- Examinations --- Microsoft Windows server. --- Windows server --- Microsoft Windows 2000 server --- Windows server 2003 --- Windows Home Server --- Microsoft Windows Home Server --- Microsoft Windows NT server
Choose an application
Syngress Study Guides guarantee comprehensive coverage of all exam objectives. There are no longer any short cuts or gimmicks that allow candidates to pass Microsoft's new, more rigorous exams. The days of cramming to become a ""paper MCSE"" are over; candidates must have a full grasp of all core concepts and plenty of hands-on experience to become certified. This book provides complete coverage of Microsoft Exam 70-293 and features one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation, this study guide & DVD training system gives
Operating systems (Computers) --- Electronic data processing personnel --- Microsoft software --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Certification. --- Examinations --- Operating systems --- Microsoft Windows server. --- Windows server --- Microsoft Windows 2000 server --- Windows server 2003 --- Windows Home Server --- Microsoft Windows Home Server --- Microsoft Windows NT server
Listing 1 - 10 of 12 | << page >> |
Sort by
|