sponsored by ComputerWeekly.com
Posted:  02 Sep 2013
Published:  02 Sep 2013
Format:  PDF
Length:  240  Page(s)
Type:  Book
Language:  English
ABSTRACT:

 

By Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder   

 

This book shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios.

 

The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access

 

This chapter shows you how to plan platform security, assess your security, controls and monitoring requirements:

 

  • Reviewing the core security principles
  • Planning a secure platform from end to edge and beyond
  • Understanding Business Requirements
  • Perform Risk Analysis
  • Review Policies, Procedures, Standards, and Guidelines
  • Security Awareness Training
  • Determine Access Control
  • Secure Software Development Strategy
  • Network Security
  • Operating System Security

 

Download includes a 30% discount for Computer Weekly Readers on all Syngress books and eBooks

 

 

 

Click on the button below to download this book extract

 

 

From basic computer security books to highly-advanced hacking eBooks, Syngress brings you high-quality, practical information to help you stay ahead of the competition.






BROWSE RELATED RESOURCES
IPv6 | Network Security | Operating Systems | Security | Security Best Practices | Security Management | Security Policies | Security Threats | Server Appliances | Training | Windows | Windows Server Software

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement