Sponsored by ComputerWeekly.com
This book shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access This chapter shows you how to plan platform security, assess your security, controls and monitoring requirements Access >>>
Table of contents
- Reviewing the core security principles
- Planning a secure platform from end to edge and beyond
- Review Policies, Procedures, Standards, and Guidelines
Premium Content for Free.
More Premium Content Accessible For Free
Food giant acts fast on lean IT
In this week's Computer Weekly, we talk to the CIO from food giant Iglo – owner of Birds Eye – about how to work with outsourcers to keep IT lean and...
The state of email trust in 2014
Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari ...
Strategies for the age of digital disruption
Disruption can happen at any time, in any sector, and its effect on traditional organisations can be fundamental. Capgemini offers some strategic ...