Windows Server 2012 Security from End to Edge and Beyond

Editorial Reviews

Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, , plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the . The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your based on different and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere .

Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments.

The book’s revolutionary “Test Lab Guide” approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors’ blog http://blogs.technet.com.b.security_talk/. Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter.

  • Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system
  • Written by two Microsoft employees who provide an inside look at the security features of Windows 8
  • Test Lab Guides enable you to test everything before deploying live to your system

Table of Contents

Chapter 1: Planning Platform Security
Chapter 2: Planning Server Role in Windows Server 2012
Chapter 3: Deploying Directory Services and Certificate Services
Chapter 4: Deploying AD FS and AD RMS in Windows Server 2012
Chapter 5: Patch Management with Windows Server 2012
Chapter 6: Virtualization Security
Chapter 7: Controlling Access to Your Environment with Authentication and Authorization
Chapter 8: Endpoint Security
Chapter 9: Secure Client Deployment with Trusted Boot and BitLocker
Chapter 10: Mitigating Application’s Vulnerabilities
Chapter 11: Mitigating Vulnerabilities
Chapter 12: Unified Remote Access and BranchCache
Chapter 13: DirectAccess Deployment Scenarios
Chapter 14: Protecting Legacy Remote Clients
Chapter 15: Cloud Security

Book Details

QR code for Windows Server 2012 Security from End to Edge and Beyond
Read More Details on Google Books

Book Preview

Windows Server 2012 Security from End to Edge and Beyond is available read online. Click to Read Sample Chapters Online

Book Reviews

Read all Windows Server 2012 Security from End to Edge and Beyond Reviews on Amazon or Goodreads

PDF eBook Free Download

Windows Server 2012 Security from End to Edge and Beyond PDF FREE DOWNLOAD in 14 Friendly File Hosts: FireDrive, ZippyShare, SockShare, ShareBeast, BayFiles, Crocko, MixtureCloud, Depositfiles, UptoBox, Uploaded, BitShare, RapidGator, TurboBit. Report Dead Links & Get a Copy

Enjoyed this Book? Please support the author, Don't Download It, buy this book from amazon.

Amazon.com - Read eBooks using the FREE Kindle Reading App on Most Devices

File HosteBook Free Download LinkFormatSize (MB)ThanksUpload Date
EU(multi)Click to downloadPDF40.8foxebook10/25/2013
UpLoadedClick to downloadPDF40.8foxebook09/16/2014
ZippyShareClick to downloadPDF40.8foxebook09/16/2014

None of the files shown here are hosted or transmitted by this server. The links are provided solely by this site’s users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms. Found illegal content? Let us know! REPORT ABUSE

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>