Microsoft Forefront threat management gateway (TMG): administrator's companion
Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, imple...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Redmond, Wash.
Microsoft Press
2010
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780735640535/?ar |
Zusammenfassung: | Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to: Implement TMG integrated security features Analyze your Web and perimeter security requirements and infrastructure Plan, install, and configure TMG Implement network intrusion prevention, proxy, caching, filtering Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies Implement remote access and site-to-site VPNs Select and configure clients Monitor and troubleshoot protected systems with Network Monitor 3 and other tools Use scripting to configure systems and automate administration Plus, get a fully searchable eBook on the companion CD For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook. |
Beschreibung: | Cover title. - Print version record |
Umfang: | 1 Online-Ressource (xl, 1011 Seiten) illustrations, portraits |
ISBN: | 9780735640535 073564053X 0735626383 9780735626386 9780735643345 0735643342 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047501723 | ||
003 | DE-627-1 | ||
005 | 20240228114513.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2010 xx |||||o 00| ||eng c | ||
020 | |a 9780735640535 |9 978-0-7356-4053-5 | ||
020 | |a 073564053X |9 0-7356-4053-X | ||
020 | |a 0735626383 |9 0-7356-2638-3 | ||
020 | |a 9780735626386 |9 978-0-7356-2638-6 | ||
020 | |a 9780735643345 |c electronic bk. |9 978-0-7356-4334-5 | ||
020 | |a 0735643342 |c electronic bk. |9 0-7356-4334-2 | ||
035 | |a (DE-627-1)047501723 | ||
035 | |a (DE-599)KEP047501723 | ||
035 | |a (ORHE)9780735640535 | ||
035 | |a (DE-627-1)047501723 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Harrison, Jim |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Microsoft Forefront threat management gateway (TMG) |b administrator's companion |c Jim Harrison, Yuri Diogenes, and Mohit Saxena ; with Tom Shinder ; foreword by David B. Cross |
246 | 3 | 3 | |a Forefront threat management gateway (TMG) |
264 | 1 | |a Redmond, Wash. |b Microsoft Press |c 2010 | |
300 | |a 1 Online-Ressource (xl, 1011 Seiten) |b illustrations, portraits | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Cover title. - Print version record | ||
520 | |a Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to: Implement TMG integrated security features Analyze your Web and perimeter security requirements and infrastructure Plan, install, and configure TMG Implement network intrusion prevention, proxy, caching, filtering Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies Implement remote access and site-to-site VPNs Select and configure clients Monitor and troubleshoot protected systems with Network Monitor 3 and other tools Use scripting to configure systems and automate administration Plus, get a fully searchable eBook on the companion CD For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook. | ||
630 | 2 | 0 | |a Microsoft Forefront Threat Management Gateway |
650 | 0 | |a Computer security |v Software | |
650 | 0 | |a Computer security |x Management | |
650 | 4 | |a Microsoft Forefront Threat Management Gateway | |
650 | 4 | |a Sécurité informatique ; Logiciels | |
650 | 4 | |a Sécurité informatique ; Gestion | |
650 | 4 | |a COMPUTERS ; Computer Literacy | |
650 | 4 | |a COMPUTERS ; Computer Science | |
650 | 4 | |a COMPUTERS ; Data Processing | |
650 | 4 | |a COMPUTERS ; Hardware ; General | |
650 | 4 | |a COMPUTERS ; Information Technology | |
650 | 4 | |a COMPUTERS ; Machine Theory | |
650 | 4 | |a COMPUTERS ; Reference | |
650 | 4 | |a Computer security ; Software | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a Software | |
700 | 1 | |a Diogenes, Yuri |e MitwirkendeR |4 ctb | |
700 | 1 | |a Saxena, Mohit |e MitwirkendeR |4 ctb | |
700 | 1 | |a Shinder, Thomas W. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780735626386 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780735626386 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780735640535/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047501723 |
---|---|
_version_ | 1821494893212598272 |
adam_text | |
any_adam_object | |
author | Harrison, Jim |
author2 | Diogenes, Yuri Saxena, Mohit Shinder, Thomas W. |
author2_role | ctb ctb ctb |
author2_variant | y d yd m s ms t w s tw tws |
author_facet | Harrison, Jim Diogenes, Yuri Saxena, Mohit Shinder, Thomas W. |
author_role | aut |
author_sort | Harrison, Jim |
author_variant | j h jh |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047501723 (DE-599)KEP047501723 (ORHE)9780735640535 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03945cam a22007692 4500</leader><controlfield tag="001">ZDB-30-ORH-047501723</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114513.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2010 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780735640535</subfield><subfield code="9">978-0-7356-4053-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">073564053X</subfield><subfield code="9">0-7356-4053-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0735626383</subfield><subfield code="9">0-7356-2638-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780735626386</subfield><subfield code="9">978-0-7356-2638-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780735643345</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7356-4334-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0735643342</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7356-4334-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047501723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047501723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780735640535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047501723</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Harrison, Jim</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microsoft Forefront threat management gateway (TMG)</subfield><subfield code="b">administrator's companion</subfield><subfield code="c">Jim Harrison, Yuri Diogenes, and Mohit Saxena ; with Tom Shinder ; foreword by David B. Cross</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Forefront threat management gateway (TMG)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Redmond, Wash.</subfield><subfield code="b">Microsoft Press</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xl, 1011 Seiten)</subfield><subfield code="b">illustrations, portraits</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover title. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to: Implement TMG integrated security features Analyze your Web and perimeter security requirements and infrastructure Plan, install, and configure TMG Implement network intrusion prevention, proxy, caching, filtering Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies Implement remote access and site-to-site VPNs Select and configure clients Monitor and troubleshoot protected systems with Network Monitor 3 and other tools Use scripting to configure systems and automate administration Plus, get a fully searchable eBook on the companion CD For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Microsoft Forefront Threat Management Gateway</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Software</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Forefront Threat Management Gateway</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Literacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Hardware ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Information Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Machine Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Reference</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Diogenes, Yuri</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saxena, Mohit</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shinder, Thomas W.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780735626386</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780735626386</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780735640535/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047501723 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:37Z |
institution | BVB |
isbn | 9780735640535 073564053X 0735626383 9780735626386 9780735643345 0735643342 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xl, 1011 Seiten) illustrations, portraits |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Microsoft Press |
record_format | marc |
spelling | Harrison, Jim VerfasserIn aut Microsoft Forefront threat management gateway (TMG) administrator's companion Jim Harrison, Yuri Diogenes, and Mohit Saxena ; with Tom Shinder ; foreword by David B. Cross Forefront threat management gateway (TMG) Redmond, Wash. Microsoft Press 2010 1 Online-Ressource (xl, 1011 Seiten) illustrations, portraits Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Cover title. - Print version record Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to: Implement TMG integrated security features Analyze your Web and perimeter security requirements and infrastructure Plan, install, and configure TMG Implement network intrusion prevention, proxy, caching, filtering Configure security for the Web, Microsoft Exchange Server, and SharePoint Products and Technologies Implement remote access and site-to-site VPNs Select and configure clients Monitor and troubleshoot protected systems with Network Monitor 3 and other tools Use scripting to configure systems and automate administration Plus, get a fully searchable eBook on the companion CD For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook. Microsoft Forefront Threat Management Gateway Computer security Software Computer security Management Sécurité informatique ; Logiciels Sécurité informatique ; Gestion COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer security ; Software Computer security ; Management Computer security Software Diogenes, Yuri MitwirkendeR ctb Saxena, Mohit MitwirkendeR ctb Shinder, Thomas W. MitwirkendeR ctb 9780735626386 Erscheint auch als Druck-Ausgabe 9780735626386 |
spellingShingle | Harrison, Jim Microsoft Forefront threat management gateway (TMG) administrator's companion Microsoft Forefront Threat Management Gateway Computer security Software Computer security Management Sécurité informatique ; Logiciels Sécurité informatique ; Gestion COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer security ; Software Computer security ; Management Computer security Software |
title | Microsoft Forefront threat management gateway (TMG) administrator's companion |
title_alt | Forefront threat management gateway (TMG) |
title_auth | Microsoft Forefront threat management gateway (TMG) administrator's companion |
title_exact_search | Microsoft Forefront threat management gateway (TMG) administrator's companion |
title_full | Microsoft Forefront threat management gateway (TMG) administrator's companion Jim Harrison, Yuri Diogenes, and Mohit Saxena ; with Tom Shinder ; foreword by David B. Cross |
title_fullStr | Microsoft Forefront threat management gateway (TMG) administrator's companion Jim Harrison, Yuri Diogenes, and Mohit Saxena ; with Tom Shinder ; foreword by David B. Cross |
title_full_unstemmed | Microsoft Forefront threat management gateway (TMG) administrator's companion Jim Harrison, Yuri Diogenes, and Mohit Saxena ; with Tom Shinder ; foreword by David B. Cross |
title_short | Microsoft Forefront threat management gateway (TMG) |
title_sort | microsoft forefront threat management gateway tmg administrator s companion |
title_sub | administrator's companion |
topic | Microsoft Forefront Threat Management Gateway Computer security Software Computer security Management Sécurité informatique ; Logiciels Sécurité informatique ; Gestion COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer security ; Software Computer security ; Management Computer security Software |
topic_facet | Microsoft Forefront Threat Management Gateway Computer security Software Computer security Management Sécurité informatique ; Logiciels Sécurité informatique ; Gestion COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer security ; Software Computer security ; Management Computer security Software |
work_keys_str_mv | AT harrisonjim microsoftforefrontthreatmanagementgatewaytmgadministratorscompanion AT diogenesyuri microsoftforefrontthreatmanagementgatewaytmgadministratorscompanion AT saxenamohit microsoftforefrontthreatmanagementgatewaytmgadministratorscompanion AT shinderthomasw microsoftforefrontthreatmanagementgatewaytmgadministratorscompanion AT harrisonjim forefrontthreatmanagementgatewaytmg AT diogenesyuri forefrontthreatmanagementgatewaytmg AT saxenamohit forefrontthreatmanagementgatewaytmg AT shinderthomasw forefrontthreatmanagementgatewaytmg |