Microsoft Internet Security and Acceleration (ISA) Server 2000 [Electronic resources] : Administrators Pocket Consultant نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Microsoft Internet Security and Acceleration (ISA) Server 2000 [Electronic resources] : Administrators Pocket Consultant - نسخه متنی

Jason Ballard, Bud Ratliff

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید



Microsoft Internet Security and Acceleration (ISA) Server 2000: Administrator''''''''s Pocket Consultant


byJason BallardandBud Ratliff

ISBN:0735614423

Microsoft Press
2003
(301 pages)

Protect and accelerate your e-business systems with Microsoft Internet Security and Acceleration (ISA) Server 2000 with this no-nonsense technical reference, which provides everything the IT professional needs to know to support ISA Server 2000.

Table of Contents

Microsoft Internet Security and Acceleration (ISA) Server 2000—Administrator''''''''s Pocket Consultant

Introduction

Part I -
Microsoft ISA Server 2000 Administrator’s Fundamentals

Chapter 1
-

Overview of Microsoft ISA Server 2000 Administration

Chapter 2
-

Installing and Configuring Microsoft ISA Server 2000

Chapter 3
-

Installing and Configuring Microsoft ISA Server 2000 Clients

Chapter 4
-

Configuring ISA Server on Small Business Server Installations

Chapter 5
-

Migrating from Microsoft Proxy Server 2.0

Chapter 6
-

Monitoring and Reporting

Part II -
Microsoft ISA Server 2000 Policy Management and Publishing Services

Chapter 7
-

Configuring ISA Policy Elements

Chapter 8
-

Configuring ISA Access Policy

Chapter 9
-

Publishing Fundamentals

Chapter 10
-

Common Web and Server Publishing Scenarios

Part III -
Microsoft ISA Server 2000 and Enterprise Systems Administration

Chapter 11
-

Managing ISA Server and Windows Active Directory

Chapter 12
-

Using Enterprise and Array Policies

Chapter 13
-

Working with Enterprise Technologies and ISA Server 2000

Part IV -
Microsoft ISA Server 2000 Security Management

Chapter 14
-

Microsoft ISA Server 2000 and Perimeter Networks

Chapter 15
-

Securing ISA Server 2000

Index

List of Figures

List of Tables

/ 123