TY - BOOK AU - Combee,Ben ED - ScienceDirect eBooks. TI - Palm OS web application developer's guide: developing and delivering PQAs with Web clipping SN - 0080478115 AV - QA76.76.O63 P35 2001eb PY - 2001/// KW - Palm OS KW - fast KW - Mobile computing KW - Internet searching KW - PalmPilot (Computer) KW - Programming KW - COMPUTERS KW - Microsoft Programming KW - bisacsh KW - Electronic books KW - local N1 - Includes index; Machine generated contents note: ch. 1 Introduction -- Intro to Windows 8 and Windows Server 2012 -- Server Manager -- Powershell -- Intro to IPv6 -- IPv6 Architecture -- Summary -- ch. 2 Network Infrastructure -- Introduction -- DHCP -- DHCP Overview -- DHCP Installation and Initial Configuration -- Initial DHCP Configuration -- Protecting Your DHCP Environment -- DNS -- DNS Overview -- DNS Installation and Initial Configuration -- Protecting Your DNS Environment -- WINS -- WINS Overview -- WINS Feature Installation and Initial Configuration -- Protecting Your WINS Environment -- Summary -- ch. 3 Securing Network Access -- Introduction -- General Network Settings -- Network Discovery -- Network Location -- Wireless Security -- Wireless Properties -- Security Types -- Wireless Encryption -- Windows Firewall -- Network Profiles -- Windows Firewall Configuration -- Windows Firewall with Advanced Security -- IPSEC -- IPSec Overview -- Configuring IPSec -- IPSec Monitoring in Windows Firewall with Advanced Security -- Windows 8 Resource Sharing -- HomeGroup -- Advanced Sharing Settings -- Windows Server 2012 Resource Sharing -- Summary -- ch. 4 Secure Remote Access -- Introduction -- Telnet -- Telnet Server -- Telnet Client -- Remote Desktop Services -- Remote Desktop on Windows 8 -- Remote Desktop Services Role on Windows Server 2012 -- Remote Desktop Connection Client -- Remote Access Role -- Remote Access Role Installation and Configuration -- DirectAccess -- VPN -- Network Policy and Access Services -- NPAS Installation and Configuration -- Network Policy Server -- Health Registration Authority -- Host Credential Authorization Protocol -- Summary -- ch. 5 Internet Connection Security -- Internet Explorer Security -- Domain Highlighting -- Frequently Visited Situs -- Safety Features -- Internet Options -- General -- Security -- Privacy -- Content -- Connections -- Programs -- Advanced -- ch. 6 Network Diagnostics and Troubleshooting -- Task Manager -- Processes -- Performance Tab -- App History -- Startup -- Users -- Services -- Resource Monitor -- Resource Monitor Overview Tab -- Resource Monitor Network Tab -- Performance Monitor -- Data Collector Sets -- Event Viewer -- Windows Logs -- Applications and Services Logs -- Network Monitor -- Summary -- ch. 7 Network Tools and Utilities -- Introduction -- Local Security Policy -- Local Policies -- Network List Manager Policies -- IP Security Policies on the Local Computer -- Advanced Audit Policy Configuration -- Group Policy -- Computer Configuration> Policies> Windows Settings -- Computer Configuration> Policies> Administrative Templates: Policy Definitions (ADMX Files) Retrieved from the Local Computer -- Computer Configuration> Preferences> Windows Settings -- Computer Configuration> Preferences> Control Panel Settings -- User Configuration> Policies> Windows Settings -- User Configuration> Policies> Administrative Templates -- Computer Configuration> Preferences> Windows Settings -- Computer Configuration> Preferences> Control Panel Settings -- Security Configuration Wizard -- Using the Security Configuration Wizard -- Command-Line Tools -- Ipconfig -- Ping -- Tracert -- Netstat -- Nbtstat -- Arp -- Getmac -- Net -- Pathping -- Route -- Netsh -- PowerShell Commands -- General Networking -- Network Management -- Other Relevant Tools -- PortQry -- Microsoft Security Compliance Manager -- Microsoft Baseline Security Analyzer -- Enhanced Mitigation Experience Toolkit -- Attack Surface Analyzer -- Summary N2 - Windows 2012 Server Network Security provides the most in-depth roadmap to deploying and maintaining a secure Windows network. This practical guide drills down into all the new features of Windows 2012 Server, and provides hands-on methods for securing your Windows systems from a network point of view. It also provides information on how to secure your Windows-based network infrastructure, including: Secure Network Access Secure Remote Access Network Tools and Applications Network Vulnerabilities and Mitigations DHCP Installations and Initial Configuration MAC Filtering DNS Server Security WINS Installation and Initial Configuration Securing Wired and Wireless Connections Windows Personal Firewall Advanced Sharing Settings Remote Desktop Services Internet Connection Sharing Network Diagnostics and Troubleshooting Common Vulnerabilities and Fixes Windows 2012 Server Network Security provides you with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8. Provides practical examples of how to secure your Windows network. Focuses specifically on Windows network security rather than general concepts. One of the first books to cover Windows Server 2012 network security UR - http://ezproxy.alfaisal.edu/login?url=https://www.sciencedirect.com/science/book/9781597499583 ER -