Thor s Microsoft Security Bible A Collection of Practical Security Techniques 1st Edition by Timothy Thor Mullen – Ebook PDF Instant Download/Delivery: 1597495735, 9781597495738
Full download Thor s Microsoft Security Bible A Collection of Practical Security Techniques 1st Edition after payment

Product details:
ISBN 10: 1597495735
ISBN 13: 9781597495738
Author: Timothy Thor Mullen
Thor s Microsoft Security Bible A Collection of Practical Security Techniques 1st Table of contents:
Chapter 1: Securely Writing Web Proxy Log Data to SQL Server and Programmatically Monitoring Web Traffic
-
Introduction
-
Scope and Considerations
-
Implementation
-
Securely Logging Data to SQL
-
Designing the Workflow
-
Execution
-
Summary
Chapter 2: Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down Access
-
Introduction
-
RSA and AES
-
Building the Web Application Structure
-
Accessing Remote Files
-
Security in Depth
-
Securing Access with WebDAV
-
Conclusion
-
Summary
Chapter 3: Analyzing and Blocking Malicious Traffic Based on Geolocation
-
Introduction
-
Research and Due Diligence
-
Implementing a Solution
-
Integrating with TMG (Threat Management Gateway)
-
Summary
-
References
Chapter 4: Creating an Externally Accessible Authenticated Proxy in a Secure Manner
-
Introduction
-
Build It and They Will Come
-
Summary
Chapter 5: The Creation and Maintenance of Low-Privileged Service Users (with a Focus on SQL)
-
Introduction
-
Creating and Configuring Service User Accounts
-
Real, Quantifiable Password Strength, and How to Measure It
-
Summary
-
References
Chapter 6: Remote Security Log Collection in a Least-Privilege Environment
-
Introduction
-
Log Fetcher Architecture
-
Accessing WMI (Windows Management Instrumentation)
-
Show Me the Code!
-
Summary
Chapter 7: Securing RDP (Remote Desktop Protocol)
-
Introduction
-
General RDP Attacks and Mitigation
-
RDP Solutions Overview
-
Direct Access of Multiple RDP Hosts
-
RDG/TSG (Remote Desktop Gateway / Terminal Services Gateway)
-
RDP Host Security
-
RDWeb and RemoteApp
-
Workstation Host Considerations
-
Limiting Access with Source Port Access Rules
-
Show Me the Code!
People also search for Thor s Microsoft Security Bible A Collection of Practical Security Techniques 1st:
thor cybersecurity
thor mailbox
thor box.office
microsoft 365 bible
key thor issues
Tags: Timothy Thor Mullen, Thor s Microsoft, Security Techniques


