Windows Server 2012 Security from End to Edge and Beyond, 1st Edition

  • Published By:
  • ISBN-10: 1597499811
  • ISBN-13: 9781597499811
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 542 Pages | eBook
  • Original Copyright 2014 | Published/Released May 2014
  • This publication's content originally published in print form: 2014

  • Price:  Sign in for price



Windows Server 2012 Security from End to Edge and Beyond shows how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to client and server and makes it possible to identify and deploy Windows 8 security features based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Tom Shinder and Yuri Diogenes offer insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in traditional data centers and cloud-based solutions. This book helps readers understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments. The book's "Test Lab Guide" approach allows readers to test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables readers to understand the technologies and move from lab to production quickly. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
About the Authors.
About the Technical Editor.
1: Planning Platform Security.
2: Planning Server Role in Windows Server 2012.
3: Deploying Directory Services and Certificate Services.
4: Deploying AD FS and AD RMS in Windows Server 2012.
5: Patch Management with Windows Server 2012.
6: Virtualization Security.
7: Controlling Access to Your Environment with Authentication and Authorization.
8: Endpoint Security.
9: Secure Client Deployment with Trusted Boot and BitLocker.
10: Mitigating Application’s Vulnerabilities.
11: Mitigating Network Vulnerabilities.
12: Unified Remote Access and BranchCache.
13: DirectAccess Deployment Scenarios.
14: Protecting Legacy Remote Clients.
15: Cloud Security.