Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Dr. Tom Shinder's ISA Server and Beyond
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Dr. Tom Shinder's ISA Server and Beyond

Dr. Tom Shinder's ISA Server and Beyond

Real World Security Solutions for Microsoft Enterprise Networks

Thomas W. Shinder, Debra Littlejohn Shinder, Martin Grasdal

864 pages, parution le 03/01/2003

Résumé

From Dr. Tom Shinder, the IT industry's foremost authority on ISA Server, this book demystifies the least understood and most under documented ISA Server configurations, including extensive coverage of DMZ topologies, Web and Server Publishing, Exchange Server services and Outlook Web Access. Recognizing that ISA Server is only one part of a multilayered security plan, it discusses how to integrate ISA Server with other Windows security features, such as the Security Configuration Toolset, the Encrypting File System, IPSec, and IIS security, and how to implement smart card authentication and secure wireless networks.
Configure a Trihomed DMZ

The trihomed DMZ demands the use of public IP addresses, and this book includes ways to avoid common configuration pitfalls that may diminish the security of your network.

  • Publish Virtually Any Type of Server to the Internet
  • Making servers located behind the ISA Server available to the Internet is one of the most popular and underdocumented ISA Server features.
  • Use VMware to Test ISA Server Configuration Scenarios
    Create routed virtual networks of ISA Servers, Web Servers, mail servers, and clients to test your designs.
  • Configure Back-to-Back DMZs
    Includes both private address and public address configurations.
  • Create a "pseudo-DMZ" out of a Trusted Network Segment
    The trusted internal network segment is contained in the LAT, and you can install multiple internal interfaces on the ISA Server computer.
  • Disable Socket Pooling
    Socket pooling is a risk when your server is connected to multiple networks and not all of those networks are trusted.
  • Balance the Demands for Security With the Need for User Access
    One of the primary challenges faced by an IIS/ISA Server administrator is balancing security with access.
  • Configure Mail Services on the ISA Server Computer
    ISA Server integrates with Exchange 2000 by making it easy to securely publish Exchange RPC and Outlook Web Access.
  • Prepare for MCSE Exam 70-227
    CD includes complete 55-question ISA Exam (Exam 70-227) from Transcender.
  • Register for Your 1 Year Upgrade
    The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!

Contents

Chapter 1 Defending the Network with ISA Server-and Beyond
  • Introduction
  • Installing ISA Server
  • Getting Started with ISA Server
  • Installing Service Pack 1
  • Supporting Network Design
  • ISA Server Certification
  • Beyond ISA Server
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 2 Defense Plan 1: The Trihomed DMZ
  • Introduction
  • Configuring a Trihomed DMZ
  • Publishing DMZ SMTP Servers
  • Publishing a Web Server
  • Publishing an FTP Server on a Trihomed DMZ Segment
  • External Network Clients Cannot Use the DMZ Interface to Connect to the Internal Network
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 3 Defense Plan 2: The Back-to-Back DMZ
  • Introduction
  • Configuring a Private Address Back-to-Back DMZ
  • Configuring a Public Address Back-to-Back DMZ
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 4 Defense Plan 3: The Internal "Pseudo" DMZ
  • Introduction
  • Using TCP/IP Filtering (TCP/IP Security)
  • Using Routing and Remote Access Service (RRAS) Packet Filters
  • Using IPSec Policies
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 5 Defense Plan 4: Advanced Server Publishing
  • Introduction
  • Disabling Socket Pooling
  • Server Publishing
  • Web Publishing
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 6 Defense Plan 5: Protecting Mail Services
  • Introduction
  • Configuring Mail Services on the ISA Server Computer
  • Configuring Mail Services on the Internal Network
  • GFI's Mail Security and Mail Essentials for SMTP Servers
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 7 Understanding Windows Default Access Control Settings
  • Introduction
  • Overview of Security Groups and Access Control
  • Configuring Security during Windows 2000 Setup
  • Default File System and Registry Permissions
  • Default User Rights
  • Default Group Membership
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 8 Using the Security Configuration Tool Set
  • Introduction
  • Security Configuration Tool Set
  • Configuring Security
  • Analyzing Security
  • Group Policy Integration
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 9 Defending Your Data with the Encrypting File System
  • Introduction
  • The Role of EFS in a Network Security Plan
  • Using the Encrypting File System
  • User Operations
  • EFS Architecture
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 10 Protecting Data in Transit with IP Security
  • Introduction
  • Network Encroachment Methodologies
  • IPSec Architecture
  • Deploying Windows IP Security
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 11 Authenticating Users with Smart Cards
  • Introduction
  • Understanding Smart Card Technology
  • Smart Card Interoperability
  • Smart Card Components
  • Enhanced Solutions
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 12 Creating a Public Key Infrastructure with Certificate Services
  • Introduction
  • PKI Concepts
  • Windows 2000 PKI Components
  • Certification Authorities
  • Installing a Windows 2000 PKI
  • Enabling Domain Clients
  • Public Key Security Policy in Windows 2000
  • Applications Overview
  • Preparing to Implement the Windows 2000 PKI
  • Backing Up and Restoring Certificate Services
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Chapter 13 Keeping Your IIS Web Servers Safe
  • Introduction
  • Preparing the OS
  • Securing the Internet Information Service
  • Running the IIS Lockdown Wizard
  • Securing IIS Global Settings
  • Securing the Default and Administration Web Sites
  • Authenticating Users
  • Summary, Defensive Tactics Fast Track, Frequently Asked Questions
Appendix A Defending Your 802.11 Wireless Network
  • Introduction
  • Understanding Wireless Networks
  • Understanding Wireless Security
  • Using a Layered Approach
  • Summary

L'auteur - Thomas W. Shinder

Thomas W. Shinder et Debra Littlejohn Shinder (MCSE, MCP + I, MCT) sont specialistes des technologies Microsoft. Tous deux formateurs, ils interviennent en tant que consultants aupres des plus grandes entreprises de Dallas (dont Xerox, Lucent Technologies, Fina Oil).
Thomas W. Shinder (MCSE, MCP+I, MCT) est spécialiste des technologies Microsoft.
Formateur, il intervient en tant que consultant auprès des plus grandes entreprises de Dallas (dont Xerox, Lucent Technologies, Fina Oil).

L'auteur - Debra Littlejohn Shinder

Debra Littlejohn Shinder, MSc, MCT, is an instructor and trainer at Eastfield College in Dallas County, Texas. She is also a technology consultant for TACteam: Training and Consulting, which she co-owns with her husband Tom Shinder. Debra authored Troubleshooting Windows 2000 TCP/lP (Syngress) and has contributed to more than 10 other Windows books published by Syngress and Osborne.
Debra Littlejohn Shinder (MCSE, MCP+I, MCT) est spécialiste des technologies Microsoft.
Formatrice, elle intervient en tant que consultante auprès des plus grandes entreprises de Dallas (dont Xerox, Lucent Technologies, Fina Oil).

Caractéristiques techniques

  PAPIER
Éditeur(s) Syngress
Auteur(s) Thomas W. Shinder, Debra Littlejohn Shinder, Martin Grasdal
Parution 03/01/2003
Nb. de pages 864
Format 19,5 x 24,2
Couverture Relié
Poids 1683g
Intérieur Noir et Blanc
EAN13 9781931836661
ISBN13 978-1-931836-66-1

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription