LEADER 03192nam 2200601Ia 450 001 9910455688703321 005 20200520144314.0 010 $a1-281-05606-5 010 $a9786611056063 010 $a0-08-047739-9 035 $a(CKB)111056487032440 035 $a(EBL)294093 035 $a(OCoLC)808614807 035 $a(SSID)ssj0000183948 035 $a(PQKBManifestationID)11170438 035 $a(PQKBTitleCode)TC0000183948 035 $a(PQKBWorkID)10199248 035 $a(PQKB)10438495 035 $a(MiAaPQ)EBC4052428 035 $a(MiAaPQ)EBC294093 035 $a(Au-PeEL)EBL294093 035 $a(CaPaEBR)ebr10020671 035 $a(CaONFJC)MIL105606 035 $a(EXLCZ)99111056487032440 100 $a20030216d2002 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aDr. Tom Shinder's ISA server and beyond$b[electronic resource] $ereal world security solutions for Microsoft Enterprise networks /$fThomas W. Schinder ; Debra Little John Schinder 210 $aRockland, Mass. $cSyngress Pub.$dc2002 215 $a1 online resource (865 p.) 300 $aDescription based upon print version of record. 311 $a1-931836-66-3 327 $aCover; Contents; Foreword and Acknowledgements; Chapter 1 Defending the Network with ISA Server-and Beyond; Chapter 2 Defense Plan 1: The Trihomed DMZ; Chapter 3 Defense Plan 2: The Back-to-Back DMZ; Chapter 4 Defense Plan 3: The Internal "Pseudo" DMZ; Chapter 5 Defense Plan 4: Advanced Server Publishing; Chapter 6 Defense Plan 5: Protecting Mail Services; Chapter 7 Understanding Windows Default Access Control Settings; Chapter 8 Using the Security Configuration Tool Set; Chapter 9 Defending Your Data with the Encrypting File System; Chapter 10 Protecting Data in Transit with IP Security 327 $aChapter 11 Authenticating Users with Smart CardsChapter 12 Creating a Public Key Infrastructure with Certificate Services; Chapter 13 Keeping Your IIS Web Servers Safe; Appendix A Defending Your 802.11 Wireless Network; Index 330 $aThe terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows ""security book."" I 606 $aClient/server computing 606 $aWeb servers 608 $aElectronic books. 615 0$aClient/server computing. 615 0$aWeb servers. 676 $a005.8 700 $aShinder$b Thomas W$0627558 701 $aSchinder$b Debra Littlejohn$0970744 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910455688703321 996 $aDr. Tom Shinder's ISA server and beyond$92206448 997 $aUNINA