Break the vicious circle of designs perpetuating the errors of the past and “just click next and accept the defaults” implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements).
The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. Managing AD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD.
After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios.
What Will You Learn
Who This Book Is For
Active Directory (AD) architects and consultants who need to provide design and engineering advice to customers; AD administrators tasked with modernizing and securing AD in their organizations; security architects wishing to learn the AD design patterns to watch out for
"Sinopsis" puede pertenecer a otra edición de este libro.
Evgenij Smirnov has 30 years of experience in IT and IT security consulting. Besides directory services and groupware, he has been, and is still active in, the virtualization and platform management space. One of his greatest passions is PowerShell, where he is a regular community contributor and Microsoft Most Valuable Professional (MVP). After leaving consulting to assume a position with Semperis, again in the Active Directory space, he decided to share his AD-related experience, valued by so many customers over the years, and author this book. You can reach him via: @cj_berlin on Twitter and evgenijsmirnov on LinkedIn.
Break the vicious circle of designs perpetuating the errors of the past and "just click next and accept the defaults" implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements).
The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. Managing AD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD.
After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios.
What Will You Learn
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 17,53 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoEUR 7,02 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: California Books, Miami, FL, Estados Unidos de America
Condición: New. Nº de ref. del artículo: I-9798868809408
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 48400503-n
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 48400503
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 48400503
Cantidad disponible: Más de 20 disponibles
Librería: Rheinberg-Buch Andreas Meier eK, Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. Neuware -Break the vicious circle of designs perpetuating the errors of the past and 'just click next and accept the defaults' implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements).The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. ManagingAD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD.After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios.What Will You LearnBuilda modern Active Directory (AD), leaving behind design antipatterns that are not valid anymoreBuild a 'secure by design' AD and accommodate legacy technology without compromising the overall securityUnderstandadvanced AD functionality such ascontrolling object visibility and partitioning Kerberos authentication by Authentication PoliciesOperate a modern AD, react to changing business requirements, and respond to ever-evolving security threatsWho This Book Is ForActive Directory (AD) architects and consultants who need to provide design and engineering advice to customers;AD administrators tasked with modernizing and securing AD in their organizations; security architects wishing to learn the AD design patterns to watch out for 536 pp. Englisch. Nº de ref. del artículo: 9798868809408
Cantidad disponible: 2 disponibles
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Break the vicious circle of designs perpetuating the errors of the past and 'just click next and accept the defaults' implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements).The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. ManagingAD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD.After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios.What Will You LearnBuilda modern Active Directory (AD), leaving behind design antipatterns that are not valid anymoreBuild a 'secure by design' AD and accommodate legacy technology without compromising the overall securityUnderstandadvanced AD functionality such ascontrolling object visibility and partitioning Kerberos authentication by Authentication PoliciesOperate a modern AD, react to changing business requirements, and respond to ever-evolving security threatsWho This Book Is ForActive Directory (AD) architects and consultants who need to provide design and engineering advice to customers;AD administrators tasked with modernizing and securing AD in their organizations; security architects wishing to learn the AD design patterns to watch out for 536 pp. Englisch. Nº de ref. del artículo: 9798868809408
Cantidad disponible: 2 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. Neuware - Break the vicious circle of designs perpetuating the errors of the past and 'just click next and accept the defaults' implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements).The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. ManagingAD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD.After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios.What Will You LearnBuilda modern Active Directory (AD), leaving behind design antipatterns that are not valid anymoreBuild a 'secure by design' AD and accommodate legacy technology without compromising the overall securityUnderstandadvanced AD functionality such ascontrolling object visibility and partitioning Kerberos authentication by Authentication PoliciesOperate a modern AD, react to changing business requirements, and respond to ever-evolving security threatsWho This Book Is ForActive Directory (AD) architects and consultants who need to provide design and engineering advice to customers;AD administrators tasked with modernizing and securing AD in their organizations; security architects wishing to learn the AD design patterns to watch out for. Nº de ref. del artículo: 9798868809408
Cantidad disponible: 2 disponibles
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
Condición: New. Nº de ref. del artículo: 48400503-n
Cantidad disponible: Más de 20 disponibles
Librería: Ria Christie Collections, Uxbridge, Reino Unido
Condición: New. In. Nº de ref. del artículo: ria9798868809408_new
Cantidad disponible: Más de 20 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. Neuware -Break the vicious circle of designs perpetuating the errors of the past and ¿just click next and accept the defaults¿ implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements).The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. Managing AD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD.After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios.What Will You LearnBuild a modern Active Directory (AD), leaving behind design antipatterns that are not valid anymoreBuild a ¿secure by design¿ AD and accommodate legacy technology without compromising the overall securityUnderstand advanced AD functionality such as controlling object visibility and partitioning Kerberos authentication by Authentication PoliciesOperate a modern AD, react to changing business requirements, and respond to ever-evolving security threatsWho This Book Is ForActive Directory (AD) architects and consultants who need to provide design and engineering advice to customers; AD administrators tasked with modernizing and securing AD in their organizations; security architects wishing to learn the AD design patterns to watch out forAPress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 536 pp. Englisch. Nº de ref. del artículo: 9798868809408
Cantidad disponible: 2 disponibles