Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Building modern Active Directoryengi...
~
Smirnov, Evgenij.
Building modern Active Directoryengineering, building, and running active directory for the next 25 years /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Building modern Active Directoryby Evgenij Smirnov.
Reminder of title:
engineering, building, and running active directory for the next 25 years /
Author:
Smirnov, Evgenij.
Published:
Berkeley, CA :Apress :2024.
Description:
xxxviii, 497 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Directory services (Computer network technology)
Online resource:
https://doi.org/10.1007/979-8-8688-0941-5
ISBN:
9798868809415$q(electronic bk.)
Building modern Active Directoryengineering, building, and running active directory for the next 25 years /
Smirnov, Evgenij.
Building modern Active Directory
engineering, building, and running active directory for the next 25 years /[electronic resource] :by Evgenij Smirnov. - Berkeley, CA :Apress :2024. - xxxviii, 497 p. :ill., digital ;24 cm.
Ch 1: Problems with AD -- Ch 2:. Modern AD -- Ch 3: Engineering Topology -- Ch 4: Engineering Lookup -- Ch 5. Engineering Authentication -- Ch 6: Engineering Authorization -- Ch 7: Engineering Configuration -- Ch 8: Engineering Administration -- Ch 9: Building a Modern AD -- Ch 10: Operating a Modern AD -- Ch 11: Transitioning to a Modern AD -- Ch 12: Conclusion.
Break the vicious circle of designs perpetuating the errors of the past and "just click next and accept the defaults" implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements) The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. Managing AD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD. After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios. What Will You Learn Build a modern Active Directory (AD), leaving behind design antipatterns that are not valid anymore Build a "secure by design" AD and accommodate legacy technology without compromising the overall security Understand advanced AD functionality such as controlling object visibility and partitioning Kerberos authentication by Authentication Policies Operate a modern AD, react to changing business requirements, and respond to ever-evolving security threats.
ISBN: 9798868809415$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-0941-5doiSubjects--Uniform Titles:
Microsoft Windows server.
Subjects--Topical Terms:
198560
Directory services (Computer network technology)
LC Class. No.: TK5105.595
Dewey Class. No.: 005.71376
Building modern Active Directoryengineering, building, and running active directory for the next 25 years /
LDR
:03574nmm a2200325 a 4500
001
672434
003
DE-He213
005
20241120115500.0
006
m d
007
cr nn 008maaau
008
250325s2024 cau s 0 eng d
020
$a
9798868809415$q(electronic bk.)
020
$a
9798868809408$q(paper)
024
7
$a
10.1007/979-8-8688-0941-5
$2
doi
035
$a
979-8-8688-0941-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.595
072
7
$a
UMP
$2
bicssc
072
7
$a
COM051380
$2
bisacsh
072
7
$a
UMP
$2
thema
082
0 4
$a
005.71376
$2
23
090
$a
TK5105.595
$b
.S641 2024
100
1
$a
Smirnov, Evgenij.
$3
985783
245
1 0
$a
Building modern Active Directory
$h
[electronic resource] :
$b
engineering, building, and running active directory for the next 25 years /
$c
by Evgenij Smirnov.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2024.
300
$a
xxxviii, 497 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Ch 1: Problems with AD -- Ch 2:. Modern AD -- Ch 3: Engineering Topology -- Ch 4: Engineering Lookup -- Ch 5. Engineering Authentication -- Ch 6: Engineering Authorization -- Ch 7: Engineering Configuration -- Ch 8: Engineering Administration -- Ch 9: Building a Modern AD -- Ch 10: Operating a Modern AD -- Ch 11: Transitioning to a Modern AD -- Ch 12: Conclusion.
520
$a
Break the vicious circle of designs perpetuating the errors of the past and "just click next and accept the defaults" implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements) The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. Managing AD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD. After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios. What Will You Learn Build a modern Active Directory (AD), leaving behind design antipatterns that are not valid anymore Build a "secure by design" AD and accommodate legacy technology without compromising the overall security Understand advanced AD functionality such as controlling object visibility and partitioning Kerberos authentication by Authentication Policies Operate a modern AD, react to changing business requirements, and respond to ever-evolving security threats.
630
0 0
$a
Microsoft Windows server.
$3
226518
650
0
$a
Directory services (Computer network technology)
$3
198560
650
1 4
$a
Microsoft.
$3
915087
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-0941-5
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000249008
電子館藏
1圖書
電子書
EB TK5105.595 .S641 2024 2024
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/979-8-8688-0941-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login