Abstract This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Mana...
Microsoft Rights Management Services (RMS) is a system designed to ensure the protection and proper ...
Abstract In today's complicated computing environment, managing data has become the primary con...
To evaluate security in the context of software reliability engineering, it is necessary to analyse ...
This investigation analyses the history of the vulnerabilities of the base system Windows Server 201...
This document talks about server security in general, and Windows Server 2012 R2 Security features i...
Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a...
Windows.NET Server is Microsoft's new contender against Linux in the server market. Scheduled f...
The early version of the Internet was designed for connectivity only, without the consideration of s...
Abstract Today, with the advancement of information technology, companies need to use many technolo...
Vulnerabilities are rapidly increasing everyday, posing a major threat to security products. It is d...
Ransomware has become an increasingly popular type of malware across the past decade and continues t...
This paper analyses the security threats that can arise against an Active Directory server when it i...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
Because the Internet makes human lives easier, many devices are connected to the Internet daily. The...
Software vulnerabilities are defects or weaknesses in a software system that if exploited can lead t...
Microsoft Rights Management Services (RMS) is a system designed to ensure the protection and proper ...
Abstract In today's complicated computing environment, managing data has become the primary con...
To evaluate security in the context of software reliability engineering, it is necessary to analyse ...
This investigation analyses the history of the vulnerabilities of the base system Windows Server 201...
This document talks about server security in general, and Windows Server 2012 R2 Security features i...
Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a...
Windows.NET Server is Microsoft's new contender against Linux in the server market. Scheduled f...
The early version of the Internet was designed for connectivity only, without the consideration of s...
Abstract Today, with the advancement of information technology, companies need to use many technolo...
Vulnerabilities are rapidly increasing everyday, posing a major threat to security products. It is d...
Ransomware has become an increasingly popular type of malware across the past decade and continues t...
This paper analyses the security threats that can arise against an Active Directory server when it i...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
Because the Internet makes human lives easier, many devices are connected to the Internet daily. The...
Software vulnerabilities are defects or weaknesses in a software system that if exploited can lead t...
Microsoft Rights Management Services (RMS) is a system designed to ensure the protection and proper ...
Abstract In today's complicated computing environment, managing data has become the primary con...
To evaluate security in the context of software reliability engineering, it is necessary to analyse ...