Windows Server 2012 security from end to edge and beyond: architecting, designing, planning, and deploying Windows Server 2012 security solutions
Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8.
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Elsevier/Syngress
2013
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597499804/?ar |
Zusammenfassung: | Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781597499811 1597499811 1299530273 9781299530270 1597499803 9781597499804 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047648457 | ||
003 | DE-627-1 | ||
005 | 20240228115318.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2013 xx |||||o 00| ||eng c | ||
020 | |a 9781597499811 |9 978-1-59749-981-1 | ||
020 | |a 1597499811 |9 1-59749-981-1 | ||
020 | |a 1299530273 |c ebk |9 1-299-53027-3 | ||
020 | |a 9781299530270 |c ebk |9 978-1-299-53027-0 | ||
020 | |a 1597499803 |9 1-59749-980-3 | ||
020 | |a 9781597499804 |9 978-1-59749-980-4 | ||
020 | |a 9781597499804 |9 978-1-59749-980-4 | ||
035 | |a (DE-627-1)047648457 | ||
035 | |a (DE-599)KEP047648457 | ||
035 | |a (ORHE)9781597499804 | ||
035 | |a (DE-627-1)047648457 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Shinder, Thomas W. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Windows Server 2012 security from end to edge and beyond |b architecting, designing, planning, and deploying Windows Server 2012 security solutions |c Thomas W. Shinder, Yuri Diogenes, Debra Littlejohn Shinder ; Richard Hicks, technical editor |
264 | 1 | |a Waltham, MA |b Elsevier/Syngress |c 2013 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8. | ||
630 | 2 | 0 | |a Microsoft Windows server |
650 | 0 | |a Operating systems (Computers) | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Microsoft Windows server | |
650 | 4 | |a Microsoft Windows server | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a operating systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Operating systems (Computers) | |
700 | 1 | |a Diogenes, Yuri |e MitwirkendeR |4 ctb | |
700 | 1 | |a Shinder, Debra Littlejohn |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781597499804 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597499804 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597499804/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047648457 |
---|---|
_version_ | 1829007776624410627 |
adam_text | |
any_adam_object | |
author | Shinder, Thomas W. |
author2 | Diogenes, Yuri Shinder, Debra Littlejohn |
author2_role | ctb ctb |
author2_variant | y d yd d l s dl dls |
author_facet | Shinder, Thomas W. Diogenes, Yuri Shinder, Debra Littlejohn |
author_role | aut |
author_sort | Shinder, Thomas W. |
author_variant | t w s tw tws |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047648457 (DE-599)KEP047648457 (ORHE)9781597499804 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02503cam a22005892c 4500</leader><controlfield tag="001">ZDB-30-ORH-047648457</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115318.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499811</subfield><subfield code="9">978-1-59749-981-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499811</subfield><subfield code="9">1-59749-981-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299530273</subfield><subfield code="c">ebk</subfield><subfield code="9">1-299-53027-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299530270</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-299-53027-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499803</subfield><subfield code="9">1-59749-980-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499804</subfield><subfield code="9">978-1-59749-980-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499804</subfield><subfield code="9">978-1-59749-980-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648457</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047648457</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597499804</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648457</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shinder, Thomas W.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Windows Server 2012 security from end to edge and beyond</subfield><subfield code="b">architecting, designing, planning, and deploying Windows Server 2012 security solutions</subfield><subfield code="c">Thomas W. Shinder, Yuri Diogenes, Debra Littlejohn Shinder ; Richard Hicks, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Elsevier/Syngress</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Microsoft Windows server</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Windows server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Windows server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Diogenes, Yuri</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shinder, Debra Littlejohn</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597499804</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597499804</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597499804/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047648457 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:40Z |
institution | BVB |
isbn | 9781597499811 1597499811 1299530273 9781299530270 1597499803 9781597499804 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Elsevier/Syngress |
record_format | marc |
spelling | Shinder, Thomas W. VerfasserIn aut Windows Server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows Server 2012 security solutions Thomas W. Shinder, Yuri Diogenes, Debra Littlejohn Shinder ; Richard Hicks, technical editor Waltham, MA Elsevier/Syngress 2013 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system. Written by two Microsoft employees who provide an inside look at the security features of Windows 8. Microsoft Windows server Operating systems (Computers) Computer security Computer Security Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems Diogenes, Yuri MitwirkendeR ctb Shinder, Debra Littlejohn MitwirkendeR ctb 9781597499804 Erscheint auch als Druck-Ausgabe 9781597499804 |
spellingShingle | Shinder, Thomas W. Windows Server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows Server 2012 security solutions Microsoft Windows server Operating systems (Computers) Computer security Computer Security Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems |
title | Windows Server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows Server 2012 security solutions |
title_auth | Windows Server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows Server 2012 security solutions |
title_exact_search | Windows Server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows Server 2012 security solutions |
title_full | Windows Server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows Server 2012 security solutions Thomas W. Shinder, Yuri Diogenes, Debra Littlejohn Shinder ; Richard Hicks, technical editor |
title_fullStr | Windows Server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows Server 2012 security solutions Thomas W. Shinder, Yuri Diogenes, Debra Littlejohn Shinder ; Richard Hicks, technical editor |
title_full_unstemmed | Windows Server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows Server 2012 security solutions Thomas W. Shinder, Yuri Diogenes, Debra Littlejohn Shinder ; Richard Hicks, technical editor |
title_short | Windows Server 2012 security from end to edge and beyond |
title_sort | windows server 2012 security from end to edge and beyond architecting designing planning and deploying windows server 2012 security solutions |
title_sub | architecting, designing, planning, and deploying Windows Server 2012 security solutions |
topic | Microsoft Windows server Operating systems (Computers) Computer security Computer Security Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems |
topic_facet | Microsoft Windows server Operating systems (Computers) Computer security Computer Security Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems |
work_keys_str_mv | AT shinderthomasw windowsserver2012securityfromendtoedgeandbeyondarchitectingdesigningplanninganddeployingwindowsserver2012securitysolutions AT diogenesyuri windowsserver2012securityfromendtoedgeandbeyondarchitectingdesigningplanninganddeployingwindowsserver2012securitysolutions AT shinderdebralittlejohn windowsserver2012securityfromendtoedgeandbeyondarchitectingdesigningplanninganddeployingwindowsserver2012securitysolutions |