<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>03325nam a2200325 a 4500</leader>
  <controlfield tag="001">1/44748</controlfield>
  <controlfield tag="008">140627s2004    us            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781931836258</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1931836256</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">47702</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">OPELS</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">OPELS</subfield>
   <subfield code="d">OPELS</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">OCLCF</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Cheah, Chun Hai.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">CYA</subfield>
   <subfield code="h">[electronic resource] :</subfield>
   <subfield code="b">securing IIS 6.0 : cover your a** by getting it right the first time /</subfield>
   <subfield code="c">Chun Hai (Bernard) Cheah, Ken Schaefer and Chris Peiris.</subfield>
  </datafield>
  <datafield tag="246" ind1="3" ind2="0">
   <subfield code="a">Securing IIS 6.0</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Rockland, MA :</subfield>
   <subfield code="b">Syngress,</subfield>
   <subfield code="c">c2004.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xviii, 317 p.) :</subfield>
   <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential IIS 6.0 features. The book is organized around the 15 &quot;MMCs&quot; (Microsoft Management Consoles) that contain the configuration menus for the essential features. The options within each menu are explained clearly, potential problems are identified up-front, and configurations are subsequently presented in the aptly named &quot;By the Book&quot; section for that MMC. Readers will also appreciate the &quot;Reality Check&quot; sidebars througout, which present valuable cost/benefit analyses of situations where there is no single &quot;right&quot; answer. * A checklist for network engineers and administrators to make sure they have configured you network professionally and responsibily * The information needed by networking professionals responsible for configuring, maintaining and troubleshooting Microsoft's Internet Information Server 6.0 * Cleeraly and concisly identifies those features of IIS that represent the highest risk factors for attacks.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Coverage includes: Script Source Access, Information Disclosure, Denial of Service, Buffer Overflows, Directory Traversal, Cross-Site Scripting, Preparing the Operating System, Partitioning Hard Drives, Installing the OS, Preparing the File System, Installing IIS, Installing Hotfixes, Locking Down COM and Database Access, Securing Web Services, Running the IIS Lockdown Wizard, Securing IIS Global Settings, Securing the Default and Administration Web Sites, Disabling Internet Printing, Disabling or Securing the FrontPage Server Extensions, Configuring URLScan, Securing Web Sites, Building a Directory Structure, Setting Master WWW Properties, Securing by Content Type, Authenticating Users, Using Anonymous Authentication, Using Basic Authentication, Using Digest Authentication, Using Integrated Windows Authentication, Using Client Certificate Mapping, Publishing Web Content, Staging and Review, Setting File Attributes, Building File Checksums, Moving Content versus Updating Content, Summary, Solutions Fast Track, Frequently Asked Questions.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Includes index.</subfield>
  </datafield>
  <datafield tag="630" ind1="0" ind2="0">
   <subfield code="a">Microsoft Internet information server.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Client/server computing.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Electronic mail systems</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Schaefer, Ken.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Peiris, Chris.</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20140627</subfield>
   <subfield code="p">00b47702</subfield>
   <subfield code="q">00b47702</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9781931836258</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/47702_9781931836258.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/47702_1931836256.jpg</subfield>
  </datafield>
 </record>
</collection>
