Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
5
result(s) for
"Microsoft ISA server"
Sort by:
Dr Tom Shinder's ISA Server and Beyond
2002
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar.The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks.The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task.
How to Cheat at Configuring ISA Server 2004
by
Littlejohn Shinder, Debra
,
Shinder, Thomas W
in
Client/server computing
,
Computer networks
,
Computer security
2006
How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running.
Configuring ISA Server 2000
2001
Microsoft's flagship ISA Server delivers the Internet to your customers!As the demand for Internet connectivity reaches a fever pitch, system administrators are being challenged to connect more and more systems to the Internet without compromising security or network performance.
Dr. Tom Shinder's Configuring ISA Server 2004
by
Shinder, Dr. Thomas W
,
Shinder, Debra Littlejohn
in
Client/server computing
,
Computer networks
,
Computer security
2004,2005
Dr. Tom and Deb Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of his prominent role as a member of the beta development team, and his featured placement on both Microsoft's ISA Server Web site and ISAserver.org.
Understanding policy-based networking
2001
Get the big picture on policy networking with this guide from one of the leaders of policy-based standards efforts With the advent of policy servers, network administrators no longer have to create data traffic rules (policy) by hand. This book will sort out the hype from the reality for this important advance in networking. The authors provide examples and case studies as well as product roadmaps and suggestions for possible migration paths from the old labor-intensive management to next-generation PBNs (policy-based networks). Readers will learn more about the first network services set up for policy-based management including Quality of Service (QoS), the Resource Reservation Protocol (RSVP) in Win2000, the LDAP directory technology, and other services nearing standards completion.