LEADER 01458nas 2200505- 450 001 996321947603316 005 20210921213022.0 011 $a2580-5606 035 $a(OCoLC)1014198625 035 $a(CKB)4100000000718824 035 $a(CONSER)--2018254111 035 $a(EXLCZ)994100000000718824 100 $a20171108a20159999 s-- - 101 0 $aind 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aBhakti persada $ejurnal aplikasi Ipteks 210 1$aBali, Indonesia :$cPoliteknik Negeri Bali,$d[2015]- 215 $a1 online resource 311 $a2477-4022 517 1 $aJurnal bhakti persada 531 0 $aBhakti persada : j. aplikasi Ipteks 606 $aScience$zIndonesia$vPeriodicals 606 $aScience$vPeriodicals 606 $aTechnology$zIndonesia$vPeriodicals 606 $aTechnology$vPeriodicals 606 $aScience$2fast$3(OCoLC)fst01108176 606 $aTechnology$2fast$3(OCoLC)fst01145078 607 $aIndonesia$2fast 608 $aPeriodicals.$2fast 608 $aPeriodicals.$2lcgft 610 $aSciences - General 615 0$aScience 615 0$aScience 615 0$aTechnology 615 0$aTechnology 615 7$aScience. 615 7$aTechnology. 712 02$aPoliteknik Negeri Bali, 906 $aJOURNAL 912 $a996321947603316 996 $aBhakti persada$92573749 997 $aUNISA LEADER 04163nam 22005175 450 001 9910910498103321 005 20251202135816.0 010 $a9798868809415$b(electronic bk.) 010 $z9798868809408 024 7 $a10.1007/979-8-8688-0941-5 035 $a(MiAaPQ)EBC31789195 035 $a(Au-PeEL)EBL31789195 035 $a(CKB)36639701300041 035 $a(DE-He213)979-8-8688-0941-5 035 $a(CaSebORM)9798868809415 035 $a(OCoLC)1472957466 035 $a(OCoLC-P)1472957466 035 $a(EXLCZ)9936639701300041 100 $a20241120d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBuilding Modern Active Directory $eEngineering, Building, and Running Active Directory for the Next 25 Years /$fby Evgenij Smirnov 205 $a1st ed. 2024. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2024. 215 $a1 online resource (525 pages) 300 $aIncludes index. 311 08$aPrint version: Smirnov, Evgenij Building Modern Active Directory Berkeley, CA : Apress L. P.,c2024 9798868809408 327 $aCh 1: Problems with AD -- Ch 2:. Modern AD -- Ch 3: Engineering Topology -- Ch 4: Engineering Lookup -- Ch 5. Engineering Authentication -- Ch 6: Engineering Authorization -- Ch 7: Engineering Configuration -- Ch 8: Engineering Administration -- Ch 9: Building a Modern AD -- Ch 10: Operating a Modern AD -- Ch 11: Transitioning to a Modern AD -- Ch 12: Conclusion. 330 $aBreak the vicious circle of designs perpetuating the errors of the past and ?just click next and accept the defaults? implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements). The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. Managing AD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD. After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios. What Will You Learn Build a modern Active Directory (AD), leaving behind design antipatterns that are not valid anymore Build a ?secure by design? AD and accommodate legacy technology without compromising the overall security Understand advanced AD functionality such as controlling object visibility and partitioning Kerberos authentication by Authentication Policies Operate a modern AD, react to changing business requirements, and respond to ever-evolving security threats . 606 $aMicrosoft software 606 $aMicrosoft .NET Framework 606 $aMicrosoft 615 0$aMicrosoft software. 615 0$aMicrosoft .NET Framework. 615 14$aMicrosoft. 676 $a005.268 700 $aSmirnov$b Evgenij$01777051 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910910498103321 996 $aBuilding Modern Active Directory$94296453 997 $aUNINA