- Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system.
- Written by two Microsoft employees who provide an inside look at the security features of Windows 8.
- Test Lab Guides enable you to test everything before deploying live to your system.
Windows 8 Security from End to Edge and Beyond shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access.
Tom Shinder and Yuri Diogenes are both Microsoft employees who bring you insider knowledge of the Windows 8 platform. They discuss Windows security technologies and how you can deploy them effectively in both the traditional datacenter and in new cloud-based solutions. When you finish the book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features first in a Test Lab and then in pilot and production environments.
Windows 8 Security introduces the revolutionary "Test Lab Guide" approach to hands-on experiences with the security technologies discussed in the book. This approach enables you to test every subject covered in the book in a predefined Test Lab Environment. The combination of Test Lab experience with conceptual and deployment guidance enables you to understand the technologies in record time and move from Test Lab to production faster than ever before. Critical material is presented in a number of ways, including key concepts, scenario-based approaches to evaluation, planning, deployment and management, as well as the Test Lab Guides. You can also download video that illustrates the functionality in the Test Lab from the authors’ blog http://blogs.technet.com.b.security_talk/. In addition, each chapter wraps up with an "Administrators Punch List," a bullet list summary of key concepts discussed in the chapter.