語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Building modern Active Directoryengi...
~
Smirnov, Evgenij.
Building modern Active Directoryengineering, building, and running active directory for the next 25 years /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Building modern Active Directoryby Evgenij Smirnov.
其他題名:
engineering, building, and running active directory for the next 25 years /
作者:
Smirnov, Evgenij.
出版者:
Berkeley, CA :Apress :2024.
面頁冊數:
xxxviii, 497 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Directory services (Computer network technology)
電子資源:
https://doi.org/10.1007/979-8-8688-0941-5
ISBN:
9798868809415$q(electronic bk.)
Building modern Active Directoryengineering, building, and running active directory for the next 25 years /
Smirnov, Evgenij.
Building modern Active Directory
engineering, building, and running active directory for the next 25 years /[electronic resource] :by Evgenij Smirnov. - Berkeley, CA :Apress :2024. - xxxviii, 497 p. :ill., digital ;24 cm.
Ch 1: Problems with AD -- Ch 2:. Modern AD -- Ch 3: Engineering Topology -- Ch 4: Engineering Lookup -- Ch 5. Engineering Authentication -- Ch 6: Engineering Authorization -- Ch 7: Engineering Configuration -- Ch 8: Engineering Administration -- Ch 9: Building a Modern AD -- Ch 10: Operating a Modern AD -- Ch 11: Transitioning to a Modern AD -- Ch 12: Conclusion.
Break the vicious circle of designs perpetuating the errors of the past and "just click next and accept the defaults" implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements) The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. Managing AD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD. After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios. What Will You Learn Build a modern Active Directory (AD), leaving behind design antipatterns that are not valid anymore Build a "secure by design" AD and accommodate legacy technology without compromising the overall security Understand advanced AD functionality such as controlling object visibility and partitioning Kerberos authentication by Authentication Policies Operate a modern AD, react to changing business requirements, and respond to ever-evolving security threats.
ISBN: 9798868809415$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-0941-5doiSubjects--Uniform Titles:
Microsoft Windows server.
Subjects--Topical Terms:
198560
Directory services (Computer network technology)
LC Class. No.: TK5105.595
Dewey Class. No.: 005.71376
Building modern Active Directoryengineering, building, and running active directory for the next 25 years /
LDR
:03574nmm a2200325 a 4500
001
672434
003
DE-He213
005
20241120115500.0
006
m d
007
cr nn 008maaau
008
250325s2024 cau s 0 eng d
020
$a
9798868809415$q(electronic bk.)
020
$a
9798868809408$q(paper)
024
7
$a
10.1007/979-8-8688-0941-5
$2
doi
035
$a
979-8-8688-0941-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.595
072
7
$a
UMP
$2
bicssc
072
7
$a
COM051380
$2
bisacsh
072
7
$a
UMP
$2
thema
082
0 4
$a
005.71376
$2
23
090
$a
TK5105.595
$b
.S641 2024
100
1
$a
Smirnov, Evgenij.
$3
985783
245
1 0
$a
Building modern Active Directory
$h
[electronic resource] :
$b
engineering, building, and running active directory for the next 25 years /
$c
by Evgenij Smirnov.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2024.
300
$a
xxxviii, 497 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Ch 1: Problems with AD -- Ch 2:. Modern AD -- Ch 3: Engineering Topology -- Ch 4: Engineering Lookup -- Ch 5. Engineering Authentication -- Ch 6: Engineering Authorization -- Ch 7: Engineering Configuration -- Ch 8: Engineering Administration -- Ch 9: Building a Modern AD -- Ch 10: Operating a Modern AD -- Ch 11: Transitioning to a Modern AD -- Ch 12: Conclusion.
520
$a
Break the vicious circle of designs perpetuating the errors of the past and "just click next and accept the defaults" implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements) The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. Managing AD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD. After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios. What Will You Learn Build a modern Active Directory (AD), leaving behind design antipatterns that are not valid anymore Build a "secure by design" AD and accommodate legacy technology without compromising the overall security Understand advanced AD functionality such as controlling object visibility and partitioning Kerberos authentication by Authentication Policies Operate a modern AD, react to changing business requirements, and respond to ever-evolving security threats.
630
0 0
$a
Microsoft Windows server.
$3
226518
650
0
$a
Directory services (Computer network technology)
$3
198560
650
1 4
$a
Microsoft.
$3
915087
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-0941-5
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000249008
電子館藏
1圖書
電子書
EB TK5105.595 .S641 2024 2024
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/979-8-8688-0941-5
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入