Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Windows Vista (once codenamed Longhorn) replaces Windows XP and will be Microsoft's most powerful client operating system to date. Security and file management has been greatly improved and hundreds of features, including multimedia creation tools, have been added.The Beyond the Manual series addresses the needs of very experienced readers. Although it is not assumed that they are familiar with the book's topic, it is assumed that they are very familiar with similar technologies. The presentation of information is extremely dense and avoids introductory or basic text. The series delivers as much information in as little space as possible.
System administrators know the Internet is a hostile environment. They can't tell when a hacker will attempt to gain access to the SQL server, but they can bet that there will be an attempt soon. Because the operating system is vital to a computer's functioning, and because it's the only layer between the machine's available resources and its users, it's critical that the operating system resist compromise. Hardening Windows is an intermediate-to-advanced guide to implementing preventative security measures for the Windows operating system, and it's the only book that covers NT, 2000, XP, and 2003. This book is designed to provide a quick and easy checklist-style reference to the steps system administrators need to take to anticipate attacks and compromises, and to harden Windows NT, 2000, XP, and Server 2003 against them.
* Practical, non-theoretical content. * Author is recognized authority on Windows network administration. * Approaches the product objectively, without evangelizing.
This text teaches PowerShell--readers won't just look up commands one at a time. Readers will learn to add Exchange mailboxes; and to run the same command on ten domain controllers. Without any prior knowledge, this book covers every topic worth covering with a depth of explanation unparalleled by any book on the market.
A guide that offers what you need to work with Windows Server 2008. It provides step-by-step procedures for using various major components, along with discussions on complex concepts such as Active Directory replication, DFS namespaces and replication, network access protection, the Server Core edition, Windows PowerShell, and server clustering.
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. Originally developed for dial-up remote access, RADIUS is now used by virtual private network (VPN) servers, wireless access points, authenticating Ethernet switches, Digital Subscriber Line (DSL) access, and other network access types. Extensible, easy to implement, supported, and actively developed, RADIUS is currently the de facto standard for remote authentication.RADIUS provides a complete, detailed guide to the underpinnings of the RADIUS protocol, with particular emphasis on the utility of user accounting. Author Jonathan Hassell draws from his extensive experience in Internet service provider operations to bring practical suggestions and advice for implementing RADIUS. He also provides instructions for using an open-source variation called FreeRADIUS."e;RADIUS is an extensible protocol that enjoys the support of a wide range of vendors,"e; says Jonathan Hassell. "e;Coupled with the amazing efforts of the open source development community to extend RADIUS's capabilities to other applications-Web, calling card security, physical device security, such as RSA's SecureID-RADIUS is possibly the best protocol with which to ensure only the people that need access to a resource indeed gain that access."e;This unique book covers RADIUS completely, from the history and theory of the architecture around which it was designed, to how the protocol and its ancillaries function on a day-to-day basis, to implementing RADIUS-based security in a variety of corporate and service provider environments. If you are an ISP owner or administrator, corporate IT professional responsible for maintaining mobile user connectivity, or a web presence provider responsible for providing multiple communications resources, you'll want this book to help you master this widely implemented but little understood protocol.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.