Sponsored by ComputerWeekly.com
This book shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access This chapter shows you how to plan platform security, assess your security, controls and monitoring requirements Access >>>
Table of contents
- Reviewing the core security principles
- Planning a secure platform from end to edge and beyond
- Review Policies, Procedures, Standards, and Guidelines
Premium Content for Free.
More Premium Content Accessible For Free
The future of Moore's Law at 50
In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years ...
No more excuses: VDI is ready!
There are a lot of reasons to avoid implementing VDI. Access this e-guide with advice from desktop virtualisation expert Brian Madden who directly ...
Taking stock of e-commerce systems
In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel ...