top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Learning Microsoft Windows Server 2012 dynamic access control / / Jochen Nickel
Learning Microsoft Windows Server 2012 dynamic access control / / Jochen Nickel
Autore Nickel Jochen
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2013
Descrizione fisica 1 online resource (146 p.)
Collana Professional expertise distilled
Soggetto topico Client/server computing
Soggetto genere / forma Electronic books.
ISBN 1-78217-819-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims
Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements
Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies
Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR - a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services
Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD - using Dynamic Access Control; Summary; Chapter 8: Automating the Solution
Identifying the complete solution
Record Nr. UNINA-9910453409103321
Nickel Jochen  
Birmingham : , : Packt Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learning Microsoft Windows Server 2012 dynamic access control / / Jochen Nickel
Learning Microsoft Windows Server 2012 dynamic access control / / Jochen Nickel
Autore Nickel Jochen
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2013
Descrizione fisica 1 online resource (146 p.)
Collana Professional expertise distilled
Soggetto topico Client/server computing
ISBN 1-78217-819-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims
Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements
Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies
Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR - a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services
Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD - using Dynamic Access Control; Summary; Chapter 8: Automating the Solution
Identifying the complete solution
Record Nr. UNINA-9910790717103321
Nickel Jochen  
Birmingham : , : Packt Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learning Microsoft Windows Server 2012 dynamic access control / / Jochen Nickel
Learning Microsoft Windows Server 2012 dynamic access control / / Jochen Nickel
Autore Nickel Jochen
Edizione [1st ed.]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2013
Descrizione fisica 1 online resource (146 p.)
Disciplina 005.713
Collana Professional expertise distilled
Soggetto topico Client/server computing
ISBN 1-78217-819-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims
Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements
Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies
Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR - a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services
Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD - using Dynamic Access Control; Summary; Chapter 8: Automating the Solution
Identifying the complete solution
Record Nr. UNINA-9910827445203321
Nickel Jochen  
Birmingham : , : Packt Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data / / Jochen Nickel
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data / / Jochen Nickel
Autore Nickel Jochen
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham, England ; ; Mumbai : , : Packt, , 2019
Descrizione fisica 1 online resource (681 pages)
Disciplina 004.6782
Soggetto topico Cloud computing - Data processing
Soggetto genere / forma Electronic books.
ISBN 1-78913-115-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910493237803321
Nickel Jochen  
Birmingham, England ; ; Mumbai : , : Packt, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data / / Jochen Nickel
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data / / Jochen Nickel
Autore Nickel Jochen
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham, England ; ; Mumbai : , : Packt, , 2019
Descrizione fisica 1 online resource (681 pages)
Disciplina 004.6782
Soggetto topico Cloud computing - Data processing
ISBN 1-78913-115-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Building and Managing Azure Active Directory -- Chapter 2: Understanding Identity Synchronization -- Chapter 3: Exploring Advanced Synchronization Concepts -- Chapter 4: Monitoring Your Identity Bridge -- Chapter 5: Configuring and Managing Identity Protection -- Chapter 6: Managing Authentication Protocols -- Chapter 7: Deploying Solutions on Azure AD and ADFS -- Chapter 8: Using the Azure AD App Proxy and the Web Application Proxy -- Chapter 9: Deploying Additional Applications on Azure AD -- Chapter 10: Exploring Azure AD Identity Services -- Chapter 11: Creating Identity Life Cycle Management in Azure -- Chapter 12: Creating a Security Culture -- Chapter 13: Identifying and Detecting Sensitive Data -- Chapter 14: Understanding Encryption Key Management Strategies -- Chapter 15: Configuring Azure Information Protection Solutions -- Chapter 16: Azure Information Protection Development.
Record Nr. UNINA-9910793482603321
Nickel Jochen  
Birmingham, England ; ; Mumbai : , : Packt, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data / / Jochen Nickel
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data / / Jochen Nickel
Autore Nickel Jochen
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham, England ; ; Mumbai : , : Packt, , 2019
Descrizione fisica 1 online resource (681 pages)
Disciplina 004.6782
Soggetto topico Cloud computing - Data processing
ISBN 1-78913-115-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Building and Managing Azure Active Directory -- Chapter 2: Understanding Identity Synchronization -- Chapter 3: Exploring Advanced Synchronization Concepts -- Chapter 4: Monitoring Your Identity Bridge -- Chapter 5: Configuring and Managing Identity Protection -- Chapter 6: Managing Authentication Protocols -- Chapter 7: Deploying Solutions on Azure AD and ADFS -- Chapter 8: Using the Azure AD App Proxy and the Web Application Proxy -- Chapter 9: Deploying Additional Applications on Azure AD -- Chapter 10: Exploring Azure AD Identity Services -- Chapter 11: Creating Identity Life Cycle Management in Azure -- Chapter 12: Creating a Security Culture -- Chapter 13: Identifying and Detecting Sensitive Data -- Chapter 14: Understanding Encryption Key Management Strategies -- Chapter 15: Configuring Azure Information Protection Solutions -- Chapter 16: Azure Information Protection Development.
Record Nr. UNINA-9910808854503321
Nickel Jochen  
Birmingham, England ; ; Mumbai : , : Packt, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui