Windows Server 2012 Security from End to Edge and Beyond Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

ISBN-10: 1597499803
ISBN-13: 9781597499804
Edition: 2013
List price: $74.95 Buy it from $47.09
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Windows 8 Security from End to Edge and Beyond shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. The book covers security technologies that apply to both client and server  More...

Used Starting from $47.09
New Starting from $86.10
eBooks Starting from $74.95
Buy
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
History of Western Art Online content $4.95 $1.99
Add to cart
Study Briefs
History of World Philosophies Online content $4.95 $1.99
Add to cart
Study Briefs
American History Volume 1 Online content $4.95 $1.99
Add to cart
Study Briefs
History of Western Music Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $74.95
Copyright year: 2013
Publisher: Elsevier Science & Technology Books
Publication date: 5/2/2013
Binding: Paperback
Pages: 542
Size: 7.50" wide x 9.25" long x 1.50" tall
Weight: 2.442

Windows 8 Security from End to Edge and Beyond shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access. Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows security technologies and how you can deploy them effectively in both the traditional datacenter and in new cloud-based solutions. When you finish the book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features first in a Test Lab and then in pilot and production environments. Windows 8 Security introduces the revolutionary "Test Lab Guide" approach to hands-on experiences with the security technologies discussed in the book. This approach enables you to test every subject covered in the book in a predefined Test Lab Environment. The combination of Test Lab experience with conceptual and deployment guidance enables you to understand the technologies in record time and move from Test Lab to production faster than ever before. Critical material is presented in a number of ways, including key concepts, scenario-based approaches to evaluation, planning, deployment and management, as well as the Test Lab Guides. You can also download video that illustrates the functionality in the Test Lab from the authors' blog http://blogs.technet.com.b.security_talk/. In addition, each chapter wraps up with an "Administrators Punch List," a bullet list summary of key concepts discussed in the chapter. Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8. Test Lab Guides enable you to test everything before deploying live to your system.

Dr. Tom Shinder is a 17 year veteran of the IT industry. Prior to entering IT, Dr. Tom graduated from the University of Illinois College of Medicine with a Doctor of Medicine and was a practicing neurologist with special interests in epilepsy and multiple sclerosis. Dr. Tom began his career in IT as a consultant, and has worked with many large companies, including Fina Oil, Microsoft, IBM, HP, Dell and many others. He started his writing career toward the end of the 1990s and has published over 30 books on Windows, Windows Networking, Windows Security and ISA Server/TMG, UAG and Microsoft DirectAccess. For over a decade, ISA Server and TMG were Tom's passions, and he ran the popular web site www.isaserver.org, in addition to writing 8 books on ISA/TMG. Tom joined Microsoft in December of 2009 as a member of the UAG DirectAccess team and started the popular "Edge Man" blog that covered UAG DirectAccess. He is currently a Principal Knowledge Engineer in the Server and Cloud Division Information Experience Group Solution's Team and his primary focus now is private cloud - with special interests in private cloud infrastructure and security.

Yuri Diogenes started working on IT field as computer operator back in 1993 using MS-DOS 5.5 and Windows 3.1. In 1998 moved to a Microsoft Partner where he was instructor for computer classes and also wrote internal training materials such as Windows NT 4 and Networking Essentials. His initial experience with security started in 1998 when he had to setup the Internet security connectivity using Microsoft Proxy 2.0 and Cisco routers. In 2001 Yuri released his first book (in Portuguese) about Cisco CCNA Certification. In 2003 Yuri accepted the offer to be a Professor in a University in Brazil where he taught operating system and computer networks classes. In December 2003 he moved to United States to work for Microsoft as a contractor in the Customer Service and Support for Latin America messaging division. In 2004 he moved to Dell Computers in Round Rock, Texas to work as Server Advisor in the Network Operating System (NOS) Team, dealing primarily with Windows, Exchange and ISA (2000/2004). Yuri returned to MS as a full time employee in 2006 to work again on the Customer Service and Support for Latin America, but at this time to be dedicated to the platform division. There I was responsible to primarily support Windows Networking and ISA Server (200/2004/2006) for enterprise customers from Latin America. In 2007 he joined the Customer Services and Support Security Team as a Security Support Engineer where he was dedicated to work with Edge protection (ISA Server and then TMG). In 2010 Yuri co-wrote the Forefront Administrator's Companion book and also three other Forefront books in partnership with Tom Shinder. During this time Yuri also wrote articles for his own blog (blogs.technet.com/yuridiogenes), TechNet Magazine, ISSA Journal and other Security magazines in Brazil. Nowadays Yuri Diogenes works as a Senior Technical Writer for the Server and Cloud division Information Experience Team where he writes articles about Cloud Infrastructure with security functionalities baked in. On his currently role he also deliver presentations at public events such as TechED US, Europe, Brazil and internal Microsoft conferences such as TechReady. Currently Yuri is also working on his Master degree in Cybersecurity Intelligence & Forensics at UTICA while also writing the second edition of his Security+ book (in Portuguese). Yuri holds several industry certifications, including CISSP, E:CEH, E:CSA, CompTIA, Security+, CompTIA Cloud Essentials Certified, CompTIA Network+, CASP, MCSE, MCTS, MCT and many other Microsoft certifications. You can follow Yuri Diogenes on Twitter @yuridiogenes

Acknowledgments
About the Authors
About the Technical Editor
Foreword
Planning Platform Security
Reviewing the Gore Security Principles
Planning a Secure Platform from End to Edge and Beyond
Understanding Business Requirements
Perform Risk Analysis
Review Policies, Procedures, Standards, and Guidelines
Security Awareness Training
Determine Access Control
Secure Software Development Strategy
Network Security
Operating System Security
From End to Edge and Beyond Chapter Previews
Planning Platform Security
Planning Server Role in Windows 8
Deploying Directory Services and Certificate Services
Deploying AD FS and AD RMS in Windows Server 2012
Patch Management with Windows Server 2012
Virtualization Security
Controlling Access to Your Environment with Authentication and Authorization
Endpoint Security
Secure Client Deployment with Trusted Boot and BitLocker
Mitigating Application's Vulnerabilities
Mitigating Network Vulnerabilities
Unified Remote Access and BranchCache
DirectAccess Deployment Scenarios
Protecting Legacy Remote Clients
Cloud Security
Summary
Planning Server Role in Windows Server 2012
Server Role and Security Considerations
Using Security Configuration Wizard to Harden the Server
Using Server Manager to Add a New Role or Feature
Using Security Compliance Manager to Hardening Servers
Planning Before Hardening Your Server with SCM
Staying Up to Date with SCM
Administrator's Punch List
Summary
Deploying Directory Services and Certificate Services
Evolving Threats Against Certificates
Implementing Directory Services on Windows Server 2012
Installing the Active Directory Domain Services Role
Creating a New Forest with the Windows Server 2012 Server Manager
Implementing Certificate Services on Windows Server 2012
Planning AD CS Implementation
Installing AD CS Role
Installing AD CS Using Server Manager
Site-Aware Certificate Enrollment
Configuring CA Site
Renew with the Same Key
Validate Your Knowledge in AD CS
Administrator's Punch List
Summary
Deploying AD FS and AD RMS in Windows Server 2012
Planning for Active Directory Federation Services
Deploying Active Directory Federation Services
Installing AD FS Role Service Using PowerShell
Installing and Deploying AD FS Using Server Manager
Troubleshooting Active Directory Federation Services
Active Directory Rights Management Services
General Considerations When Planning to Deploy AD RMS
Installing and Deploying Active Directory Rights Management Services
Validate Your Knowledge in AD RMS
Summary
Patch Management with Windows Server 2012
Why Should You Have a Patch Management Strategy in Place?
Planning WSUS Deployment on Windows Server 2012
Planning WSUS on Windows Server 2012
Deploying WSUS
Managing Updates with WSUS
Configure Synchronization
Configure Target Group
Review and Approve Updates
Using Group Policy to Configure WSUS
Validating the Configuration
Administrator's Punch List
Summary
Virtualization Security
Considerations Regarding Virtualization Security in Microsoft Platform
Understanding and Deploying Windows Server 2012 Hyper-V Security Capabilities
ARP Poisoning/Spoofing Protection
DHCP Guard Protection
Port ACLs
Network Traffic Monitoring
Isolated Private VLAN (PVLAN)
High Availability for Virtualization Security
Beyond the Hypervisor
Scenario: Virtualization Security Considerations for a Cloud Infrastructure
Private Cloud Security
Administrator's Punch List
Summary
Controlling Access to Your Environment with Authentication and Authorization
Planning Authentication, Authorization, and Access Control
Data Classification
Data Control
Auditing
Understanding Dynamic Access Control
DAC Requirements
Planning for DAC
Planning Authentication
KDC Proxy
Resource-Based Constrained Delegation
Picture Password
Setting Up Picture Password
Logging on with Picture Password
Picture Password Management Issues
Configuring Dynamic Access Control
Summary
Endpoint Security
Considerations Regarding Endpoint Security
Planning Endpoint Security
Windows 8 Security Enhancements
Windows Defender
Windows SmartScreen
Action Center
Encrypting File System
Administrator's Punch List
Summary
Secure Client Deployment with Trusted Boot and BitLocker
Security Considerations for Mobile Users
Data Breaches: A Growing Problem
Consequences of a Data Breach
Protecting Against Data Breaches
Understanding the Trusted Boot Process
How UEFI Enables Secure Boot
Windows 8 and UEFI
Windows 8 Boot Hardening Features
Understanding BitLocker Full Volume Encryption
FVE vs. File/Folder Encryption
How BitLocker Works Together with Other Technologies to Protect Mobile Users
How BitLocker Works
Deploying BitLocker
Troubleshooting, Recovery, and Repair
Summary
Mitigating Application's Vulnerabilities
Living in the World of Apps
Windows App Store Security
Browser Protection
A Sandbox Called AppContainer
SmartScreen
The Old Friends Are Still Here: UAC and AppLocker
Harderiing Application Environment
Extra Tools
SDL Threat Modeling Tool
Attack Surface Analyzer
Enhanced Mitigation Experience Toolkit
Security Tools Community Edition
Summary
Mitigating Network Vulnerabilities
Understanding Windows Firewall with Advanced Security
Evolution of the Windows Firewall
Deploying and Managing the Windows Firewall with Advanced Security
What Is New in Windows 8 and Windows Server 2012
Configuring the Windows Firewall with Advanced Security
Controlling the Windows Firewall Through Group Policy
Managing the Windows Firewall with PowerShell and Netsh
Troubleshooting the Windows Firewall with Advanced Security
Protecting the Windows Endpoint with IPsec Rules
Configuring IPsec Rules on Windows Firewall with Advanced Security
Common Deployment Scenarios
Host Firewall with Network Location Awareness
Server and Domain Isolation with Windows Firewall and IPsec
Using SMB Encryption to Protect Data Traversing the Network
Enabling SMB Encryption
Under the Hood
Summary
Unified Remote Access and BranchCache
The Evolving Remote Access Landscape
New Capabilities in DirectAccess
DirectAccess and RRAS Better Together
Simplified DirectAccess Management
Deploy DirectAccess Without a PKI
Say Goodbye to IPv6 and Hello to IPv4
Put the DirectAccess Server Behind Your Firewall
Real High Availability
Multiple Domains Made Easy
NAP Integration
One-Time Password Support
Split Tunnel or Forced Tunneling? It Is Your Choice
Improved IP-HTTPS Performance and Authentication Support
Force Manage Out Only
DirectAccess at Multiple Sites
Support for Server Core
DirectAccess Remote Domain Offline Join
DirectAccess and Windows To Go
DirectAccess Reqmrements and Planning
What is BranchCache?
Overview of BranchCache Deployment
Content Server Configuration
Hosted Cache Server Configuration
Preloading the Hosted Cache Servers
Configure the Clients
Administrator's Punch List
Summary
DirectAccess Deployment Scenarios
The Simplified DirectAccess Server Test Lab
Create a Security Group for DirectAccess Clients on DC1
Install the Unified Remote Access Server Role on EDGE1
Run the Getting Started Wizard on EDGE1
Setup and Test Client1 for DirectAccess Connectivity
Overview of Traditional DirectAccess Single Server Deployment
Administrator's Punch List
Summary
Protecting Legacy Remote Clients
Virtual Private Networking with Windows Server 2012
Brief History of Windows VPN Protocols
The RRAS Unified Server Role
Deploying a VPN Server on Windows Server 2012 via the GUI
Installing Remote Access Services on Windows Server 2012 via PowerShell
Deploying Network Access Protection (NAP) Through Network Policy and Access Services
NAP Overview
Deploying NAP on Windows Server 2012
Summary
Cloud Security
General Considerations for Cloud Security (SaaS)
Cloud Security Readiness Tool
General Considerations for Cloud Security (IaaS)
Network Security
Compute Security
Guest Compute Security
Host Compute Security
Building a Private Cloud with Windows Server 2012
Summary
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×