Thor's Microsoft Security Bible : A Collection of Practical Security Techniques

Archibald Books and More
(1998)
Registrado como vendedor particular
Por tanto, no se aplican las normas de protección de los consumidores derivadas de la legislación de la UE en materia de consumidores. La Garantía al cliente de eBay sigue aplicando a la mayoría de compras. Más información
USD24,50
Aproximadamente21,07 EUR
Estado:
En muy buen estado
Tight cover and clean text. (406)
Respira tranquilidad. Envíos y devoluciones gratis.
Envío:
Gratis Economy Shipping.
Ubicado en: Grand Prairie, Texas, Estados Unidos
Entrega:
Entrega prevista entre el sáb. 11 oct. y el mié. 15 oct. a 94104
Las fechas previstas de entrega (se abre en una nueva ventana o pestaña) incluyen el tiempo de manipulación del vendedor, el código postal de origen, el código postal de destino y la hora de aceptación, y dependen del servicio de envío seleccionado y de que el pago se haya hecho efectivoel pago se haya hecho efectivo (se abre en una nueva ventana o pestaña). Los plazos de entrega pueden variar, especialmente en épocas de mucha actividad.
Devoluciones:
30 días para devoluciones. El vendedor paga el envío de la devolución.
Pagos:
    Diners Club

Compra con confianza

Garantía al cliente de eBay
Si no recibes el artículo que has pedido, te devolvemos el dinero. Más informaciónGarantía al cliente de eBay - se abre en una nueva ventana o pestaña
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:205195306890

Características del artículo

Estado
En muy buen estado
Libro que se ha leído y que no tiene un aspecto nuevo, pero que está en un estado excelente. No hay desperfectos visibles en la tapa y se incluye sobrecubierta, si procede, para las tapas duras. Todas las páginas están en perfecto estado, sin arrugas ni roturas y no falta ninguna. El texto no está subrayado ni resaltado de forma alguna, y no hay anotaciones en los márgenes. Puede presentar marcas de identificación mínimas en la contraportada o las guardas. Muy poco usado. Consulta el anuncio del vendedor para obtener más información y la descripción de cualquier posible imperfección. Ver todas las definiciones de estadose abre en una nueva ventana o pestaña
Notas del vendedor
“Tight cover and clean text. (406)”
Features
Illustrated
Country/Region of Manufacture
United States
ISBN
9781597495721
Categoría

Acerca de este producto

Product Identifiers

Publisher
Elsevier Science & Technology Books
ISBN-10
1597495727
ISBN-13
9781597495721
eBay Product ID (ePID)
109069977

Product Key Features

Number of Pages
336 Pages
Language
English
Publication Name
Thor's Microsoft Security Bible : a Collection of Practical Security Techniques
Subject
Security / General, Information Management
Publication Year
2011
Type
Textbook
Subject Area
Computers, Business & Economics
Author
Timothy Thor Mullen
Format
Hardcover

Dimensions

Item Length
9.2 in
Item Width
7.5 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2011-499120
Dewey Edition
22
Reviews
"Most recognize Thor as the Norse god of thunder with massive powers of destruction. Few realize that he was also the god of restoration. Likewise, his namesake, Timothy "Thor" Mullen, has spent his entire adult life both destroying and restoring Microsoft-based security systems. Thor's Microsoft Security Bible conveys the wisdom and expertise of the industry legend that has defined the bleeding edge of Microsoft security for over twenty years. I highly recommend this book." -Johnny Long, Hacker at Large Author of the best-selling "Google Hacking" series, "This book presents a fascinating collections of practical and immediately implementable Microsoft security techniques, processes, and methodologies uniquely illustrated through real-world process examples. The author enriches the reader with detailed technical information on security processes for all major Microsoft applications in simple readable form.Top security professionals as well as many younger aspirants in the security sector should find this book extremely informative and useful."-- Security Management, December 2012, page 83 "I was looking for the standard security bible (change this setting or that setting), and I did ultimately get that. Thor's chosen delivery method does walk through the changing of settings, but does it in such a subtle way as to not make the content boring. This is a book that when you begin, you think 'huh?' But once you complete it, you think 'Ah ha!' Generally, security bibles can be dull, but given the author's humor, vast knowledge of securing Windows Server 2008, and his ability to explain the topics to even a novice, makes this work shine. Anyone working in a Windows Server environment is doing themselves a disservice by not reading this book. The included video content was refreshing, as the author continues his dialogue with you. He walks through setting up Chapter 1 and Chapter 7 on the fly, so any mistakes you will see. It was nice to hear his voice, since, if you're like me, it makes it easier when reading. TMSB is a great book, and for all you Windows 2008 Server Administrators out there, I'd run, not walk, to get this book!"-- EthicalHacker.net "This book is aimed at technical, security and non-security professionals alike, used to bolster their security knowledge and to allow them to harden services that are often reliant on general OS hardening and firewalls. The book offers detailed descriptions on how to provide secure infrastructure services, such as SQL, as a least- privileged account, and therefore offers system engineers a guide to bolstering their system's security posture as much as is possible." --Best Systems Administration Book in InfoSecReviews Book Awards, "Mullen presents realistic business scenarios with tips on products, tools, and methods to create an autonomous web traffic monitor, analyze and block traffic based on geolocation, set up a secure external web proxy, cover remote desktop protocol security, and create and maintain service users."-- Reference and Research Book News, August 2013 "This book presents a fascinating collections of practical and immediately implementable Microsoft security techniques, processes, and methodologies uniquely illustrated through real-world process examples. The author enriches the reader with detailed technical information on security processes for all major Microsoft applications in simple readable form.Top security professionals as well as many younger aspirants in the security sector should find this book extremely informative and useful."-- Security Management, December 2012, page 83 "I was looking for the standard security bible (change this setting or that setting), and I did ultimately get that. Thor's chosen delivery method does walk through the changing of settings, but does it in such a subtle way as to not make the content boring. This is a book that when you begin, you think 'huh?' But once you complete it, you think 'Ah ha!' Generally, security bibles can be dull, but given the author's humor, vast knowledge of securing Windows Server 2008, and his ability to explain the topics to even a novice, makes this work shine. Anyone working in a Windows Server environment is doing themselves a disservice by not reading this book. The included video content was refreshing, as the author continues his dialogue with you. He walks through setting up Chapter 1 and Chapter 7 on the fly, so any mistakes you will see. It was nice to hear his voice, since, if you're like me, it makes it easier when reading. TMSB is a great book, and for all you Windows 2008 Server Administrators out there, I'd run, not walk, to get this book!"-- EthicalHacker.net "This book is aimed at technical, security and non-security professionals alike, used to bolster their security knowledge and to allow them to harden services that are often reliant on general OS hardening and firewalls. The book offers detailed descriptions on how to provide secure infrastructure services, such as SQL, as a least- privileged account, and therefore offers system engineers a guide to bolstering their system's security posture as much as is possible." --Best Systems Administration Book in InfoSecReviews Book Awards, "Most recognize Thor as the Norse god of thunder with massive powers of destruction. Few realize that he was also the god of restoration. Likewise, his namesake, Timothy "Thor" Mullen, has spent his entire adult life both destroying and restoring Microsoft-based security systems.  Thor's Microsoft Security Bible conveys the wisdom and expertise of the industry legend that has defined the bleeding edge of Microsoft security for over twenty years. I highly recommend this book." -Johnny Long, Hacker at Large Author of the best-selling "Google Hacking" series, "I was looking for the standard security bible (change this setting or that setting), and I did ultimately get that. Thor's chosen delivery method does walk through the changing of settings, but does it in such a subtle way as to not make the content boring. This is a book that when you begin, you think 'huh?' But once you complete it, you think 'Ah ha!' Generally, security bibles can be dull, but given the author's humor, vast knowledge of securing Windows Server 2008, and his ability to explain the topics to even a novice, makes this work shine. Anyone working in a Windows Server environment is doing themselves a disservice by not reading this book. The included video content was refreshing, as the author continues his dialogue with you. He walks through setting up Chapter 1 and Chapter 7 on the fly, so any mistakes you will see. It was nice to hear his voice, since, if you're like me, it makes it easier when reading. TMSB is a great book, and for all you Windows 2008 Server Administrators out there, I'd run, not walk, to get this book!"-- EthicalHacker.net, "Mullen presents realistic business scenarios with tips on products, tools, and methods to create an autonomous web traffic monitor, analyze and block traffic based on geolocation, set up a secure external web proxy, cover remote desktop protocol security, and create and maintain service users."-- Reference and Research Book News, August 2013 "This book presents a fascinating collections of practical and immediately implementable Microsoft security techniques, processes, and methodologies uniquely illustrated through real-world process examples. The author enriches the reader with detailed technical information on security processes for all major Microsoft applications in simple readable form...Top security professionals as well as many younger aspirants in the security sector should find this book extremely informative and useful."-- Security Management, December 2012, page 83 "I was looking for the standard security bible (change this setting or that setting), and I did ultimately get that. Thor's chosen delivery method does walk through the changing of settings, but does it in such a subtle way as to not make the content boring. This is a book that when you begin, you think 'huh?' But once you complete it, you think 'Ah ha!' Generally, security bibles can be dull, but given the author's humor, vast knowledge of securing Windows Server 2008, and his ability to explain the topics to even a novice, makes this work shine. Anyone working in a Windows Server environment is doing themselves a disservice by not reading this book. The included video content was refreshing, as the author continues his dialogue with you. He walks through setting up Chapter 1 and Chapter 7 on the fly, so any mistakes you will see. It was nice to hear his voice, since, if you're like me, it makes it easier when reading. TMSB is a great book, and for all you Windows 2008 Server Administrators out there, I'd run, not walk, to get this book!"-- EthicalHacker.net "This book is aimed at technical, security and non-security professionals alike, used to bolster their security knowledge and to allow them to harden services that are often reliant on general OS hardening and firewalls. The book offers detailed descriptions on how to provide secure infrastructure services, such as SQL, as a least- privileged account, and therefore offers system engineers a guide to bolstering their system's security posture as much as is possible." --Best Systems Administration Book in InfoSecReviews Book Awards
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG) Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV) Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL) Chapter 6. Remote Security Log Collection in a Least Privilege Environment Chapter 7. Securing RDP Appendix A: List Of Acronyms Appendix B: Full list of Server 2008 logs via WEVTUTIL tool
Synopsis
Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes and methodologies uniquely illustrated through real-world process examples. This book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, and application specific security (IIS, SQL, Active Directory, etc.). It also includes new, never-before-published security tools complete with source code; detailed technical information on security processes for all major Microsoft applications; unique project-based storytelling delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases; reference-style content for access to specific application security techniques and methods; actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so. This book will be of interest to systems and network administrators, IT managers, security and network engineers, and database administrators. Named the 2011 Best Systems Administration Book by InfoSec Reviews Detailed technical information on security processes for all major Microsoft applications Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases Reference-style content for access to specific application security techniques and methods Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so, Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes and methodologies uniquely illustrated through real-world process examples. This book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, and application specific security (IIS, SQL, Active Directory, etc.). It also includes new, never-before-published security tools complete with source code; detailed technical information on security processes for all major Microsoft applications; unique project-based storytelling delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases; reference-style content for access to specific application security techniques and methods; actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so. This book will be of interest to systems and network administrators, IT managers, security and network engineers, and database administrators.
LC Classification Number
QA76.9.A25

Descripción del artículo del vendedor

Acerca de este vendedor

Archibald Books and More

100% de votos positivos3,6 mil artículos vendidos

Se unió el mar 2003
Suele responder en 24 horas
Registrado como vendedor particularPor tanto, no se aplican los derechos de los consumidores derivados de las leyes de protección de los consumidores de la UE. La Garantía al cliente de eBay sigue aplicando a la mayoría de compras. Más informaciónMás información
Selling - Antiques, Books, Collectibles, Stamps, Coins, Stock Certificates, Vintage Machines, Auto Manuals, Baseball Football and Basketball Cards, Office Supplies, Vintage Newspapers and Magazines, ...
Ver más
Visitar tiendaContactar

Valoraciones detalladas sobre el vendedor

Promedio durante los últimos 12 meses
Descripción precisa
5.0
Gastos de envío razonables
5.0
Rapidez de envío
5.0
Comunicación
5.0

Votos de vendedor (1.664)

Todas las valoraciones
Positivas
Neutras
Negativas
  • a***a (107)- Votos emitidos por el comprador.
    Últimos 6 meses
    Compra verificada
    Very pleased on the shipping speed and how well packaged it was. Perfectly described and all the pics helped to show the fine details. The price couldn't be beat for such a rare cookbook, excellent value. Everything went smoothly and this seller is top-notch! Thank you!
  • t***a (599)- Votos emitidos por el comprador.
    Mes pasado
    Compra verificada
    Excellent packaging with fast and safe shipping. Books as listed. Great seller.
  • u***e (1204)- Votos emitidos por el comprador.
    Mes pasado
    Compra verificada
    Super fast delivery, well-packaged, as described, great seller!