Windows Server 2012 Security From End To Edge And Beyond: Architecting, Designing, Planning, And Deploying Windows Server 2012 Security Solutions by Thomas W ShinderWindows Server 2012 Security From End To Edge And Beyond: Architecting, Designing, Planning, And Deploying Windows Server 2012 Security Solutions by Thomas W Shinder

Windows Server 2012 Security From End To Edge And Beyond: Architecting, Designing, Planning, And…

byThomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder

Paperback | April 30, 2013

Pricing and Purchase Info

$97.27 online 
$103.50 list price save 6%
Earn 486 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

Windows Server 2012 Security from End to Edge and Beyondshows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access.

Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments.

The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors blog http://blogs.technet.com.b.security_talk/. Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter.



  • Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system
  • Written by two Microsoft employees who provide an inside look at the security features of Windows 8
  • Test Lab Guides enable you to test everything before deploying live to your system
Dr. Tom Shinder is a 17 year veteran of the IT industry. Prior to entering IT, Dr. Tom graduated from the University of Illinois College of Medicine with a Doctor of Medicine and was a practicing neurologist with special interests in epilepsy and multiple sclerosis. Dr. Tom began his career in IT as a consultant, and has worked with ma...
Loading
Title:Windows Server 2012 Security From End To Edge And Beyond: Architecting, Designing, Planning, And…Format:PaperbackDimensions:542 pages, 9.25 × 7.5 × 0.68 inPublished:April 30, 2013Publisher:Syngress PublishingLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1597499803

ISBN - 13:9781597499804

Look for similar items by category:

Reviews

Table of Contents

Chapter 1: Planning Platform Security

Chapter 2: Planning Server Role in Windows Server 2012

Chapter 3: Deploying Directory Services and Certificate Services

Chapter 4: Deploying AD FS and AD RMS in Windows Server 2012

Chapter 5: Patch Management with Windows Server 2012

Chapter 6: Virtualization Security

Chapter 7: Controlling Access to your Environment with Authentication and Authorization

Chapter 8: Endpoint Security

Chapter 9: Secure Client Deployment with Trusted Boot and BitLocker

Chapter 10: Mitigating Application's Vulnerabilities

Chapter 11: Mitigating Network Vulnerabilities

Chapter 12: Unified Remote Access and BranchCache

Chapter 13: DirectAccess Deployment Scenarios

Chapter 14: Protecting Legacy Remote Clients

Chapter 15: Cloud Security

Editorial Reviews

"This comprehensive book is designed to cover security for the client device that connects to server based applications, services and the servers themselves.  It also covers security for the edge of the network such as a firewall or a remote access server and finally, security for the cloud."--Microsoft Security Blog, November 8, 2012 "In this reference on Windows Server 2012 Security the authors Shindler, Shindler, and Diogenes, all with strong backgrounds in Windows network security in academia and private industry, attempt to cover the full range of security issues that affect the Windows network environment. The organizing principles throughout are availability, integrity, and confidentiality."--Reference & Research Book News, October 2013 "This book shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise.The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access."--ComputerWeekly.com, September 2, 2013