Dr. Tom Shinder's ISA Server and Beyond
Real World Solutions for Microsoft Enterprise Networks
Not just another “Windows security” book, Dr. Tom Shinder’s ISA Server and Beyond has been written, reviewed, and field tested with Microsoft’s own network and security engineers to help tens of thousands of Microsoft engineers successfully lock down entire Microsoft enterprise networks using ISA Server from today’s and tomorrow’s most destructive intruders.
Configure a Trihomed DMZ
The trihomed DMZ demands the use of public IP addresses, and this book includes ways to avoid common configuration pitfalls that may diminish the security of your network.
Publish Virtually Any Type of Server to the Internet
Making servers located behind the ISA Server available to the Internet is one of the most popular and underdocumented ISA Server features.
Use VMware to Test ISA Server Configuration Scenarios
Create routed virtual networks of ISA Servers, Web Servers, mail servers, and clients to test your designs.
Configure Back-to-Back DMZs
Includes both private address and public address configurations.
Create a "pseudo-DMZ" out of a Trusted Network Segment
The trusted internal network segment is contained in the LAT, and you can install multiple internal interfaces on the ISA Server computer.
Disable Socket Pooling
Socket pooling is a risk when your server is connected to multiple networks and not all of those networks are trusted.
Balance the Demands for Security With the Need for User Access
One of the primary challenges faced by an IIS/ISA Server administrator is balancing security with access.
Configure Mail Services on the ISA Server Computer
ISA Server integrates with Exchange 2000 by making it easy to securely publish Exchange RPC and Outlook Web Access.
Register for Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Title: Dr. Tom Shinder's ISA Server and Beyond
Author: Thomas W. Shinder; Debra Littlejohn Shinder; Martin Grasdal
Programming in Haskell 2016 US$ 32.50 322 pages
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide 2015 US$ 61.50 1104 pages
Computer Age Statistical Inference 2016 US$ 53.99 497 pages
- Academic > Computer Science > Computer science
- Academic > Computer Science > Electronic data processing
- Academic > Computer Science > Computers - special aspects
- Academic > Computer Science > System design; Periodicals
- Academic > Computer Science > Computer security
- Computers > Operating Systems > Windows
- Computers > Internet > Security
- Computers > Security
- Computers > Networking