|
|
Registro Completo |
Biblioteca(s): |
Ebooks. |
Data corrente: |
07/01/2011 |
Data da última atualização: |
16/06/2011 |
Autoria: |
BIN AZAD, T.; WILSON, C.; WRIGHT, M. |
Afiliação: |
Connie Wilson; Michael Wright. |
Título: |
Securing Citrix XenApp Server in the enterprise |
Ano de publicação: |
2008 |
Fonte/Imprenta: |
Burlington, Mass.: Syngress; Oxford: Elsevier Science [distributor], 2008. |
Páginas: |
xxviii, 739 p. : |
Descrição Física: |
ill. ; 24 cm. |
ISBN: |
9781597492812 |
Idioma: |
Inglês |
Notas: |
Includes index. |
Conteúdo: |
1: Advanced Encryption Standard Support; 2: Citrix Password Manager; 3: Security Considerations in a Citrix Presentation Server Deployment; 4 FIPS 140 and Citrix Presentation; 5 Kerberos Authentication; 6 Citrix Presentation Server Clients; 7 Virtual Channels; 8: Additional Citrix Presentation Server Security Features 9: Deploying SSL Relay; 10: Deploying Secure Gateway; 11: Using Secure Gateway (Double-Hop); 12: Using SSL Relay and the Web Interface.Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it?s running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains. * The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server. * Special chapter by Security researcher Petko D. Petkov?aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers. * Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server. Menos1: Advanced Encryption Standard Support; 2: Citrix Password Manager; 3: Security Considerations in a Citrix Presentation Server Deployment; 4 FIPS 140 and Citrix Presentation; 5 Kerberos Authentication; 6 Citrix Presentation Server Clients; 7 Virtual Channels; 8: Additional Citrix Presentation Server Security Features 9: Deploying SSL Relay; 10: Deploying Secure Gateway; 11: Using Secure Gateway (Double-Hop); 12: Using SSL Relay and the Web Interface.Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it?s running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix P... Mostrar Tudo |
Palavras-Chave: |
Client/server computing; Computer security. |
Categoria do assunto: |
-- |
URL: |
https://www.sciencedirect.com/science/book/9781597492812
|
Marc: |
LEADER 03175nam a2200193 a 4500 001 1872217 005 2011-06-16 008 2008 bl uuuu u0uu1 u #d 020 $a9781597492812 100 1 $aBIN AZAD, T. 245 $aSecuring Citrix XenApp Server in the enterprise$h[electronic resource] 260 $aBurlington, Mass.: Syngress; Oxford: Elsevier Science [distributor]$c2008 300 $axxviii, 739 p. :$cill. ; 24 cm. 500 $aIncludes index. 520 $a1: Advanced Encryption Standard Support; 2: Citrix Password Manager; 3: Security Considerations in a Citrix Presentation Server Deployment; 4 FIPS 140 and Citrix Presentation; 5 Kerberos Authentication; 6 Citrix Presentation Server Clients; 7 Virtual Channels; 8: Additional Citrix Presentation Server Security Features 9: Deploying SSL Relay; 10: Deploying Secure Gateway; 11: Using Secure Gateway (Double-Hop); 12: Using SSL Relay and the Web Interface.Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it?s running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains. * The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server. * Special chapter by Security researcher Petko D. Petkov?aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers. * Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server. 653 $aClient/server computing 653 $aComputer security 700 1 $aWILSON, C. 700 1 $aWRIGHT, M.
Download
Esconder MarcMostrar Marc Completo |
Registro original: |
Ebooks (Ebooks) |
|
Nenhum exemplar cadastrado para este documento. |
Voltar
|
|
Registro Completo
Biblioteca(s): |
Embrapa Agropecuária Oeste. |
Data corrente: |
25/09/2001 |
Data da última atualização: |
30/08/2011 |
Tipo da produção científica: |
Circular Técnica |
Autoria: |
BARBO, C. V. S.; CARNIELLI, A.; POTTKER, D.; SALVADORI, J. R.; SILVA, C. M. da; SONEGO, O. R.; FERNANDES, F. M. |
Título: |
Recomendações técnicas para a cultura da soja: região da Grande Dourados - safra 1980/81. |
Ano de publicação: |
1980 |
Fonte/Imprenta: |
Dourados: EMBRAPA-UEPAE Dourados, 1980. |
Páginas: |
53 p. |
Série: |
(EMBRAPA-UEPAE Dourados. Circular técnica, 2). |
Idioma: |
Português |
Conteúdo: |
Solos: amostragem, conservacao, correcao e adubacao; Epoca de semeadura; Espacamento e densidade e caracteristicas; Cultivares de soja e caracteristicas; Controle de ervas daninhas; Manejo de pragas; Tratamento quimico de sementes; Controle de doencas; Colheita. |
Thesagro: |
Erva Daninha; Praga de Planta; Soja; Solo. |
Categoria do assunto: |
-- |
URL: |
https://ainfo.cnptia.embrapa.br/digital/bitstream/item/40852/1/CT-02.80.pdf
|
Marc: |
LEADER 00973nam a2200253 a 4500 001 1255176 005 2011-08-30 008 1980 bl uuuu 00u1 u #d 100 1 $aBARBO, C. V. S. 245 $aRecomendações técnicas para a cultura da soja$bregião da Grande Dourados - safra 1980/81. 260 $aDourados: EMBRAPA-UEPAE Dourados$c1980 300 $a53 p. 490 $a(EMBRAPA-UEPAE Dourados. Circular técnica, 2). 520 $aSolos: amostragem, conservacao, correcao e adubacao; Epoca de semeadura; Espacamento e densidade e caracteristicas; Cultivares de soja e caracteristicas; Controle de ervas daninhas; Manejo de pragas; Tratamento quimico de sementes; Controle de doencas; Colheita. 650 $aErva Daninha 650 $aPraga de Planta 650 $aSoja 650 $aSolo 700 1 $aCARNIELLI, A. 700 1 $aPOTTKER, D. 700 1 $aSALVADORI, J. R. 700 1 $aSILVA, C. M. da 700 1 $aSONEGO, O. R. 700 1 $aFERNANDES, F. M.
Download
Esconder MarcMostrar Marc Completo |
Registro original: |
Embrapa Agropecuária Oeste (CPAO) |
|
Biblioteca |
ID |
Origem |
Tipo/Formato |
Classificação |
Cutter |
Registro |
Volume |
Status |
Fechar
|
Expressão de busca inválida. Verifique!!! |
|
|