Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization Ebook

,
Publication: Syngress
 
Is my Device Supported?

You're about to purchase a Downloadable Ebook

Hi, sorry for the interruption!
We're repeating some important information here to ensure that you're making an informed purchase. Please review it.

  • Don't get caught unaware. Preview ebook and open the sample ebook on each of your intended devices before continuing.
  • You will need a Free 3rd-party application that can read the intermediate .acsm file you will receive as download. PDF/Epub format is downloaded automatically by the application thereafter. Please install the necessary software first on your intended device of use.
  • - Printing is permitted.
    - You can copy text from file.
  • Refund Policy
    Refunds are not allowed after the ebook is opened so please open the ebook directly on your intended device. Refund requests should be recieved within 7 days after download is made available. Of course, if you get an incorrect ebook ( different from what is mentioned in the title) or if the ebook doesn't open on the initial device, then we'll assist with fixing the issue or get you a refund if a timely fix isn't available.
  • Customer Service
    We currently only provide ticket (online form submission) or email support. Rest assured that you're in good hands; customers like our professional service!
I have previewed the ebook and read the requirements and terms.
Cancel

Language: English
Publication Date: July 2008
Pages: 407
File Size: 15495 Kbytes

Restrictions set by Publisher:
- Text-to-speech feature not available.
- Printing is permitted.
- You can copy text from file.
- Free application Adobe Digital Editions, Aldiko reader, or Bluefire reader required .
$46.40 $62.95
( 26.29% savings )
Great Prices, Always!
Change Region
 

You're about to purchase a Downloadable Ebook

Hi, sorry for the interruption!
We're repeating some important information here to ensure that you're making an informed purchase. Please review it.

  • Don't get caught unaware. Preview ebook and open the sample ebook on each of your intended devices before continuing.
  • You will need a Free 3rd-party application that can read the intermediate .acsm file you will receive as download. PDF/Epub format is downloaded automatically by the application thereafter. Please install the necessary software first on your intended device of use.
  • - Printing is permitted.
    - You can copy text from file.
  • Refund Policy
    Refunds are not allowed after the ebook is opened so please open the ebook directly on your intended device. Refund requests should be recieved within 7 days after download is made available. Of course, if you get an incorrect ebook ( different from what is mentioned in the title) or if the ebook doesn't open on the initial device, then we'll assist with fixing the issue or get you a refund if a timely fix isn't available.
  • Customer Service
    We currently only provide ticket (online form submission) or email support. Rest assured that you're in good hands; customers like our professional service!
I have previewed the ebook and read the requirements and terms.
Cancel

Language: English
Publication Date: July 2008
File Size: 5327 Kbytes

Restrictions set by Publisher:
- Text-to-speech feature not available.
- Printing is permitted.
- You can copy text from file.
- Free application Adobe Digital Editions, Aldiko reader, or Bluefire reader required .
$50.00 $62.95
( 20.57% savings )
Great Prices, Always!
Change Region
 
ISBN: 9780080569970   Should I buy this Ebook?   Write a Review

Description

Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as “the most secure Windows Server ever”. However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn’t mean that Windows is inherently less secure than other operating systems; it’s simply a numbers game. More machines running Windows Server. More targets for attackers to hack.
As a result of being at the top of the “most used” and “most hacked” lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including:
1. Network Access Protection, which gives administrators the power to isolate computers that don’t comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.
2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.
3. Protection of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.
4. Protection against malicious software with User Account Control with a new authentication architecture.
5. Increased control over your user settings with Expanded Group Policy.
…to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.

  • Describes new technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system.
  • Outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment. No GUI needed.
  • Describes Windows Server 2008?s security innovations, such as Network Access Protection, Federated Rights Management, and Read-Only Domain Controller
  • Includes coverage of monitoring, securing, and troubleshooting Windows Server 2008
  • Covers Microsoft’s Hyper-V virtualization technology, which is offered as an add-on to four of the eight versions of Windows Server 2008 and as a stand-alone product

Recommendations:

Schaum's Outline of Mathematics for Nurses ebook cover
Save 17.95%
Demystifying the IPsec Puzzle ebook cover
Save 11.12%

Should you buy this Ebook?

We've put together a collection of resources to help you make a decision regarding whether you should buy this Ebook from us.

  1. Is your device one of these? Ebook reading software will work on the following devices: Windows, Mac, Android 2.2+ Devices, IPad (iOS 3+), IPhone (iOS 3+), Kindle Fire. Several other devices are also supported by the software.
  2. Compare prices. Our price is $46.40. If you would like to research our competitors to see their prices. Here're some places to look:
  3. Why should you buy Ebooks from onlinebookplace.com?

    We've had 1000s of downloads so far and with over 300000+ Ebooks to choose from, onlinebookplace.com is becoming a favorite Ebook Store for many. Allow us to win you over with our competitive pricing, upfront policies and diligent customer service.

    We're Upfront:

    • Every Ebook page on onlinebookplace.com has information on restrictions that publishers have placed on the Ebook along with a clear indication of software required to read the Ebooks.
    • If ratings for an Ebook are available from one of several sources online, then we've attempted to get those to help you make a better purchasing decision about the Ebook. Reviews from Goodreads (a popular reviews site) are provided on the same if they're available.
    • In most cases, we've also attempted to get you links to the Ebook on our competitor's site so that you can compare prices with relative ease.
    • We use McAfee to scan for any vulnerabilities in the system to ensure that any information that you give us does not fall into the wrong hands.
    • We use Paypal, a trusted 3rd party payment provider to accept Payments -- your payment information doen't reside with us. Any information that does end up with us is safe.

After installing the appropriate app for your device, try a Sample Download (Sherlock Holmes from Project Gutenberg) before purchase. The sample is only for checking device compatibility.

Check below for device compatibility and any free 3rd-party software requirements. Choice of what ebook reading app to use is yours, we only present a few common apps that several customers of ours have preferred. You should be able to transfer your purchase to more than one (upto 6) compatible devices as long as your ebook-reading apps have been registered with the same Adobe ID before opening the file.

Computers/laptops/Mac

Windows/Mac PC or Laptop

Free app Adobe Digital Editions required. Note that this software is not the same as Adobe Reader.

Android

Android 2.1+

Free app Aldiko Reader or Bluefire Reader required.

Kindle Fire (and any Android based Kindle models)

Free Kindle Android app Bluefire Reader required.

IPhone/IPad

IPad or IPhone

Free app Bluefire Reader required. Kindly review their tutorial for the requirement (note that while they're talking about library ebooks, same applies to your purchased .acsm file) -- feel free to use the sample download for testing. Tutorial .

Other E-Reader

Several Other devices supported

Devices like Nook are supported via the free application Adobe Digital Editions . This software is not the same as Adobe Reader. Please check compatibility of your device before purchase.

Hot deal!
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization