Securing Citrix XenApp Server in the enterprise:
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool...
Gespeichert in:
Weitere beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Burlington, Mass. Oxford
Syngress ;
2008
Burlington, Mass. Oxford Elsevier Science [distributor] 2008 |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597492812/?ar |
Zusammenfassung: | Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it?s running on. By definition, Citrix is granting remote users direct access to corporate servers?.achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains. * The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server. * Special chapter by Security researcher Petko D. Petkov?aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers. * Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server |
Beschreibung: | Includes index. - Print version record |
Umfang: | 1 Online-Ressource (xxviii, 739 Seiten) illustrations |
ISBN: | 9781597492812 1597492817 9780080569987 0080569986 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047647639 | ||
003 | DE-627-1 | ||
005 | 20240228114314.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2008 xx |||||o 00| ||eng c | ||
020 | |a 9781597492812 |9 978-1-59749-281-2 | ||
020 | |a 1597492817 |9 1-59749-281-7 | ||
020 | |a 9780080569987 |c electronic bk. |9 978-0-08-056998-7 | ||
020 | |a 0080569986 |c electronic bk. |9 0-08-056998-6 | ||
035 | |a (DE-627-1)047647639 | ||
035 | |a (DE-599)KEP047647639 | ||
035 | |a (ORHE)9781597492812 | ||
035 | |a (DE-627-1)047647639 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.4476 |2 22 | |
245 | 1 | 0 | |a Securing Citrix XenApp Server in the enterprise |c Tariq Bin Azad, technical editor ; Connie Wilson, Michael Wright, contributors |
264 | 1 | |a Burlington, Mass. |a Oxford |b Syngress ; |c 2008 | |
264 | 1 | |a Burlington, Mass. |a Oxford |b Elsevier Science [distributor] |c 2008 | |
300 | |a 1 Online-Ressource (xxviii, 739 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Print version record | ||
520 | |a Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it?s running on. By definition, Citrix is granting remote users direct access to corporate servers?.achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains. * The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server. * Special chapter by Security researcher Petko D. Petkov?aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers. * Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server | ||
630 | 2 | 0 | |a Citrix MetaFrame |
650 | 0 | |a Client/server computing |x Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Citrix MetaFrame | |
650 | 4 | |a Citrix MetaFrame | |
650 | 4 | |a Architecture client-serveur (Informatique) ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Operating Systems ; General | |
650 | 4 | |a Computer security | |
700 | 1 | |a Bin Azad, Tariq |e MitwirkendeR |4 ctb | |
700 | 1 | |a Wilson, Connie |e MitwirkendeR |4 ctb | |
700 | 1 | |a Wright., Michael |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781597492812 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597492812 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597492812/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047647639 |
---|---|
_version_ | 1821494867514097664 |
adam_text | |
any_adam_object | |
author2 | Bin Azad, Tariq Wilson, Connie Wright., Michael |
author2_role | ctb ctb ctb |
author2_variant | a t b at atb c w cw m w mw |
author_facet | Bin Azad, Tariq Wilson, Connie Wright., Michael |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047647639 (DE-599)KEP047647639 (ORHE)9781597492812 |
dewey-full | 005.4476 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.4476 |
dewey-search | 005.4476 |
dewey-sort | 15.4476 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04193cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-047647639</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114314.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2008 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492812</subfield><subfield code="9">978-1-59749-281-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492817</subfield><subfield code="9">1-59749-281-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080569987</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-056998-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080569986</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-056998-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647639</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047647639</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597492812</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647639</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.4476</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing Citrix XenApp Server in the enterprise</subfield><subfield code="c">Tariq Bin Azad, technical editor ; Connie Wilson, Michael Wright, contributors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="a">Oxford</subfield><subfield code="b">Syngress ;</subfield><subfield code="c">2008</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="a">Oxford</subfield><subfield code="b">Elsevier Science [distributor]</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxviii, 739 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it?s running on. By definition, Citrix is granting remote users direct access to corporate servers?.achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains. * The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server. * Special chapter by Security researcher Petko D. Petkov?aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers. * Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Citrix MetaFrame</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Client/server computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Citrix MetaFrame</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Citrix MetaFrame</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture client-serveur (Informatique) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Operating Systems ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bin Azad, Tariq</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wilson, Connie</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wright., Michael</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597492812</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597492812</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597492812/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047647639 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:12Z |
institution | BVB |
isbn | 9781597492812 1597492817 9780080569987 0080569986 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxviii, 739 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Syngress ; Elsevier Science [distributor] |
record_format | marc |
spelling | Securing Citrix XenApp Server in the enterprise Tariq Bin Azad, technical editor ; Connie Wilson, Michael Wright, contributors Burlington, Mass. Oxford Syngress ; 2008 Burlington, Mass. Oxford Elsevier Science [distributor] 2008 1 Online-Ressource (xxviii, 739 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Print version record Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it?s running on. By definition, Citrix is granting remote users direct access to corporate servers?.achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains. * The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server. * Special chapter by Security researcher Petko D. Petkov?aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers. * Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server Citrix MetaFrame Client/server computing Security measures Computer security Architecture client-serveur (Informatique) ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Operating Systems ; General Bin Azad, Tariq MitwirkendeR ctb Wilson, Connie MitwirkendeR ctb Wright., Michael MitwirkendeR ctb 9781597492812 Erscheint auch als Druck-Ausgabe 9781597492812 |
spellingShingle | Securing Citrix XenApp Server in the enterprise Citrix MetaFrame Client/server computing Security measures Computer security Architecture client-serveur (Informatique) ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Operating Systems ; General |
title | Securing Citrix XenApp Server in the enterprise |
title_auth | Securing Citrix XenApp Server in the enterprise |
title_exact_search | Securing Citrix XenApp Server in the enterprise |
title_full | Securing Citrix XenApp Server in the enterprise Tariq Bin Azad, technical editor ; Connie Wilson, Michael Wright, contributors |
title_fullStr | Securing Citrix XenApp Server in the enterprise Tariq Bin Azad, technical editor ; Connie Wilson, Michael Wright, contributors |
title_full_unstemmed | Securing Citrix XenApp Server in the enterprise Tariq Bin Azad, technical editor ; Connie Wilson, Michael Wright, contributors |
title_short | Securing Citrix XenApp Server in the enterprise |
title_sort | securing citrix xenapp server in the enterprise |
topic | Citrix MetaFrame Client/server computing Security measures Computer security Architecture client-serveur (Informatique) ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Operating Systems ; General |
topic_facet | Citrix MetaFrame Client/server computing Security measures Computer security Architecture client-serveur (Informatique) ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Operating Systems ; General |
work_keys_str_mv | AT binazadtariq securingcitrixxenappserverintheenterprise AT wilsonconnie securingcitrixxenappserverintheenterprise AT wrightmichael securingcitrixxenappserverintheenterprise |