Purchase CYA Securing IIS – 1st Edition. Print Book & E-Book. ISBN , CYA Securing IIS – Ebook written by Chris Peiris, Ken Schaefer. Read this book using Google Play Books app on your PC, android, iOS devices. Download . It contains easy-to-access coverage of just about every documented IIS security setting. The following features ensure that you know exactly what you are .
|Country:||Moldova, Republic of|
|Published (Last):||26 March 2006|
|PDF File Size:||8.71 Mb|
|ePub File Size:||14.2 Mb|
|Price:||Free* [*Free Regsitration Required]|
He is currently a contract Solution Consultant working on Internet solutions analysis, design and consultancy as well as implementation, primary focus includes online ecommerce system security and high availability features. His latest role is with the Commonwealth Bank of Australia.
He also lectures on Distributed Component Architectures. NET technologies by Microsoft, Redmond. Chris is designing and developing Microsoft solutions since His expertise lies in developing scalable, high-performance solutions for financial institutions, G2G, B2B and media groups. Chris has written many articles, reviews and columns for various online publications including 15Seconds, and Developer Exchange.
Would you like to tell us about a lower price? If you are a seller for this product, would you like to suggest updates through seller support? A highly portable, easily digestible road-map to configuring, maintaining 60. troubleshooting essential IIS 6. The book is organized around the decuring “MMCs” Microsoft Management Consoles that contain the configuration menus for the essential features.
The options within each menu are explained clearly, potential problems are identified up-front, and configurations are subsequently presented in the aptly named “By the Book” section for that MMC.
Read more Read less. Discover Prime Book Box for Kids. Syngress; 1st edition April 1, Language: Try the Kindle edition and experience these great reading features: Share your thoughts with other customers.
Write a customer review. Showing of 5 reviews.
There was a problem providing the content you requested
Top Reviews Most recent Top Reviews. There was a problem filtering reviews right now. Please try again later. This book does cover security in IIS. But, the content largely repeats Microsoft documentation which is available at no cost elsewhere.
CYA Securing IIS Chris Peiris, Bernard Cheah, Ken Schaefer: : Books
The presentation consists largely of screen shots plus instructions of what fields to fill in. Background and design information is mentioned but generally not integrated into the text for any practical result.
There is very little “system administrator” perspective offered to provide a coherent approach to addressing IIS security. The check lists are a good idea.
Download Cya Securing Iis 6.0
However, unfortunately, you’ll often have to look outside the book itself for information about the topics: You’ll find little information about password technology in Windows. Approaching this correctly is critical for avoiding some serious vulnerabilities.
The value of the book is that secuting presents information relevant to IIS security in one place. However, other books present the same information more thoroughly, with better background and administration guidance.
There’s nothing here that you cant find yourself on the net in less than five minutes. This book was written for the kind of person that has trouble finding the “ON” switch – not a real network administrator.
If you know what you’re doing, then dont waste your money. Most people in the business world are likely familiar with the term “CYA”, which is exactly what this book is designed to do. The authors intend that reading this book will give IIS administrators the information they need to keep their networks secure, and hence keep their jobs. This is the first CYA book I’ve read, and I was quite impressed by the nice balance between providing enough useful information without overkill.
The book is designed to get right to the point by showing not telling exactly what is required in securing an IIS 6 installation. Each chapter is focused on a specific section of IIS security. Each chapter contains the some information on the Microsoft recommended procedure for the particular practice what the authors call “By the Book”. Additionally, you will find many sections throughout the book labeled “Realty Check”, which is designed to highlight how to either do something different from what Microsoft recommends or what some of the problems associated with the recommended procedure might be.
Finally, “Notes from the Underground” popup frequently, which help illustrate how hackers might utilize poor security around the illustrated practice in order to gain something. I found the chapters to be well laid-out, easy to follow, and right to the point.
This book helped provide some real insight to various security practices around IIS, and was quite interesting to read as well. This book is a must-have if you are responsible for monitoring or maintaining IIS 6 in your infrastructure. I am definitely looking forward to reading the next in the series of CYA books! Thank you guys for an excellent book! I have been developing applications for IIS for many years and think you have done a great job in explaining how it all works.
I also very much like the “reality check” concept. Keep up the good work! It is a practical book. Each chapter is lacking of coherent. It is better to have scenario to illustrate why this should be used or done. See all 5 reviews. There’s a problem loading this menu right now. Learn more about Amazon Prime. Get fast, free shipping with Amazon Prime. Get to Know Us. English Choose a language for shopping. Explore the Home Gift Guide.
Amazon Music Stream millions of songs. Amazon Advertising Find, attract, and engage customers. Amazon Drive Cloud storage from Amazon. Alexa Actionable Analytics for the Web.
AmazonGlobal Ship Orders Internationally. Amazon Inspire Digital Educational Resources. Amazon Rapids Fun stories for kids on the go. Amazon Restaurants Food delivery from local restaurants. ComiXology Thousands of Digital Comics.
East Dane Designer Men’s Fashion. Shopbop Designer Fashion Brands. Withoutabox Submit to Film Festivals. Amazon Renewed Refurbished products with a warranty. Amazon Second Chance Pass it on, trade it in, give it a second life.