Ebook478 pages8 hours
Microsoft Forefront Security Administration Guide
Rating: 0 out of 5 stars
()
About this ebook
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking and security titles with a complete reference to Microsoft's flagship security products.
- First book to address securing an entire Microsoft network from Web servers all the way back to the desktop
- Companion Web site provides best practices checklists for securing Microsoft operating systems, applications, servers, and databases
- Companion Web site provides special chapter on designing and implementing a disaster recover plan for a Microsoft network
Author
Jesse Varsalone
Jesse Varsalone is a Cisco Certified Academy Instructor and holds the CCNA certification. Jesse is also a CISSP, MCT, MCSE, and currently works as a Computer Forensics Senior Professional.
Related to Microsoft Forefront Security Administration Guide
Related ebooks
Microsoft Forefront Security Administration Guide Rating: 0 out of 5 stars0 ratingsHow to Cheat at Administering Office Communications Server 2007 Rating: 0 out of 5 stars0 ratingsThe Real MCTS/MCITP Exam 70-620 Prep Kit: Independent and Complete Self-Paced Solutions Rating: 2 out of 5 stars2/5Security+ Study Guide Rating: 0 out of 5 stars0 ratingsJuniper(r) Networks Secure Access SSL VPN Configuration Guide Rating: 5 out of 5 stars5/5Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity Rating: 3 out of 5 stars3/5The Best Damn IT Security Management Book Period Rating: 0 out of 5 stars0 ratingsHow to Cheat at Securing Your Network Rating: 0 out of 5 stars0 ratingsHow to Cheat at Microsoft Vista Administration Rating: 0 out of 5 stars0 ratingsSecure Your Network for Free Rating: 5 out of 5 stars5/5The Real MCTS/MCITP Exam 70-642 Prep Kit: Independent and Complete Self-Paced Solutions Rating: 2 out of 5 stars2/5Designing and Building Enterprise DMZs Rating: 0 out of 5 stars0 ratingsMicrosoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization Rating: 0 out of 5 stars0 ratingsSecuring Citrix XenApp Server in the Enterprise Rating: 0 out of 5 stars0 ratingsCheck Point NGX R65 Security Administration Rating: 0 out of 5 stars0 ratingsHow to Cheat at Configuring Open Source Security Tools Rating: 0 out of 5 stars0 ratingsSecurity Sage's Guide to Hardening the Network Infrastructure Rating: 0 out of 5 stars0 ratingsMicrosoft Vista for IT Security Professionals Rating: 0 out of 5 stars0 ratingsHow to Cheat at Securing SQL Server 2005 Rating: 0 out of 5 stars0 ratingsMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research Rating: 0 out of 5 stars0 ratingsDr. Tom Shinder's ISA Server 2006 Migration Guide Rating: 0 out of 5 stars0 ratingsOSSEC Host-Based Intrusion Detection Guide Rating: 5 out of 5 stars5/5The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server Rating: 5 out of 5 stars5/5The Real MCTS/MCITP Exam 70-646 Prep Kit: Independent and Complete Self-Paced Solutions Rating: 1 out of 5 stars1/5Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit Rating: 0 out of 5 stars0 ratingsThe Real MCTS/MCITP Exam 70-647 Prep Kit: Independent and Complete Self-Paced Solutions Rating: 1 out of 5 stars1/5How to Cheat at Configuring VmWare ESX Server Rating: 0 out of 5 stars0 ratingsMobile Malware Attacks and Defense Rating: 5 out of 5 stars5/5How to Cheat at Deploying and Securing RFID Rating: 0 out of 5 stars0 ratingsMicrosoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool Rating: 5 out of 5 stars5/5
Security For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsDark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5
Reviews for Microsoft Forefront Security Administration Guide
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Microsoft Forefront Security Administration Guide - Jesse Varsalone
Enjoying the preview?
Page 1 of 1