TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Microsoft Edge
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Skype for Business
See all products »
Resources
Channel 9 Video
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Windows Update
Trials
Windows Server 2016
System Center 2016
Windows 10 Enterprise
SQL Server 2016
See all trials »
Related Sites
Microsoft Download Center
Microsoft Evaluation Center
Drivers
Windows Sysinternals
TechNet Gallery
Training
Expert-led, virtual classes
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
Microsoft Official Courses On-Demand
Certifications
Certification overview
Special offers
MCSE Cloud Platform and Infrastructure
MCSE: Mobility
MCSE: Data Management and Analytics
MCSE Productivity
Other resources
Microsoft Events
Exam Replay
Born To Learn blog
Find technical communities in your area
Azure training
Official Practice Tests
Support options
For business
For developers
For IT professionals
For technical support
Support offerings
More support
Microsoft Premier Online
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Home
Library
Wiki
Learn
Gallery
Downloads
Support
Forums
Blogs
Resources For IT Professionals
United States (English)
Россия (Pусский)
中国(简体中文)
Brasil (Português)
Skip to locale bar
Get this Tag RSS feed
Translate this page
Powered by
Microsoft® Translator
Popular Tags
Active Directory
AD
AD DS
adfs
ASP.NET
azure
BizTalk
BizTalk Server
BizTalk Server 2010
C#
Candidate for deletion
certification
cloud
core docs
de-DE
EAA
Ed Price
Ed's Stub Pages
en-US
ESA
es-ES
Excel
Exchange
Exchange 2010
fa-IR
Fernando Lugao Veltem
FIM
FIM 2010
FIM Resources
FIM-HELP
forefront
forums
fr-FR
Gokan Ozcifci
has code
has comment
has comments
has image
has Images
has Other Languages
has See Also
Has Table
Has TOC
Horizon_Net
How To
Hyper-V
id-ID
IIS
Italian Wiki Articles
it-IT
ja-JP
Jordano Mazzoni
Link Collection
Luciano Lima
Luigi Bruno
Lync Server 2010
MIISILMFIM MACAULAY
Multi Language Wiki Articles
needs work
operations manager
Pirated Content
Portal
Português Brasil
PowerShell
pt-BR
security
SharePoint
SharePoint 2010
SharePoint 2013
SharePoint Pirate
Small Basic
solucionando problemas
SQL Server
SQL Server 2012
stub
System Center
System Center 2012
TechNet Guru
TechNet Wiki
TechNet Wiki Featured Article
tonyso
Translated into Japanese
troubleshooting
tr-TR
vídeo
Video
Virtualization
VMM
Wiki
Windows
Windows 7
Windows 8
Windows Azure
Windows Server
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
yottun8
اکتیو دایرکتوری
Browse by Tags
>
TechNet Articles
>
All Tags
>
architecture
Tagged Content List
Wiki Page:
Architecting High Performance Enterprise Class Application in WPF 4.5
YutFree
Normal 0 false false false false EN-IN X-NONE X-NONE ...
on
5 Oct 2012
Wiki Page:
Factors need to considered for enterprise class application with WPF/Silverlight
YutFree
_______________________________________________________________________________________________________________________________________________________________________________________________ There are various factors that need to consider while building enterprise class applications in WPF. It’s...
on
5 Oct 2012
Wiki Page:
Private Cloud Security Challenges - Rapid Elasticity
dplotnikov - mvp
Table of Contents Security Functionality Infrastructure Security Software Security Management Security Legal Issues As a designer of a private cloud solution, I am concerned that a rogue application, client, or DoS attack might destabilize the data center by requesting a large amount of resources...
on
31 Aug 2012
Wiki Page:
what microsoft promises to offer in .NET 5.0
dplotnikov - mvp
Introduction of New Features in C# 5.0 1. C# Evolution Matrix Microsoft just published a new version of C# : 5.0 beta with CLR version 4.5 (Visual Studio 11 beta). In order to get a big picture of the whole evolution of C# language, I summarized all the key features into a C# Evolution Matrix...
on
26 Aug 2012
Wiki Page:
WPF Xaml datagrid by Infragistics
dplotnikov - mvp
xamDataGrid is UI component for .NET WPF applications developed by Infragistics , which can provides rich UI grid interface for you data. you can bind this control to ObjectDataProvider and XmlDataProvider. Main Features of this control: You can bind this control with all WPF data providers...
on
26 Aug 2012
Wiki Page:
New and Much Awaited Visual Studio 2012 with .NET 4.5 Features
Ed Price - MSFT
Table of Contents #1) Develop for Windows 8 #2) Develop for the Web #3) Develop for Windows Phone 8 #4) Develop for Windows Azure #5) Develop Business Applications #6) Develop Games and other 3D Applications #7) Take advantage of the latest language advancements #8) Performance, Reliability, and Compatibility...
on
24 Aug 2012
Wiki Page:
Understanding Garbage Collection from enterprise Perspective
kishhr
Advance Memory Management Caching objects Keep all the objects like view Model objects, Model objects, business objects, static objects etc.. in a centralized Cache. Disposing centralized cache can promote greater memory reductions. Microsoft provides built-in Cache in .NET runtime, but...
on
12 Aug 2012
Wiki Page:
Private Cloud Security Design Principles
Thomas W Shinder - MSFT
Table of Contents Apply Generic Security Best Practices Isolation is Key Consider Security as a Wrapper Assume Attackers are Authenticated and Authorized Assume All Data Locations are Accessible Do Not Trust Client Information Use Established Strong Cryptographic Techniques Automate Security Operations...
on
2 Jul 2012
Wiki Page:
Private Cloud Security Model - Infrastructure Security
Fernando Lugão Veltem
Table of Contents Physical Security Energy Supply Security Facility Security Network Security Hardware Security Compute Security Storage Security Operating System Security Virtualization Security Update Security Now that you have examined the factors within the security wrapper, this paper presents...
on
5 Jun 2012
Wiki Page:
Cloud Security Challenges
Fernando Lugão Veltem
To highlight the changes in security between traditional IT systems and cloud-based environments, this paper takes four of the five the NIST cloud computing definitions and analyses these statements to create a problem statement and a range of possible attack vectors. This paper considers each of these...
on
5 Jun 2012
Wiki Page:
Private Cloud Security Model - Wrapper Functionality
Fernando Lugão Veltem
As discussed earlier in this paper, the private cloud must implement security as a wrapper. Every transaction then must pass through this security wrapper on any data transition within the cloud, for example: Client to the service delivery layer Service delivery layer to the software...
on
5 Jun 2012
Wiki Page:
Defining the Private Cloud Security Problem Domain
Fernando Lugão Veltem
As previous sections in this document outline, security is a universal component of cloud service provisioning. To help consider this requirement logically, this series considers the key security differences in private cloud environments, which result from the unique features of a cloud-based service...
on
5 Jun 2012
Wiki Page:
Software to Services - A Journey by Microsoft
Jewel Lambert
Microsoft recently transformed the strategic direction of the company by expanding its already extensive software products and cloud services capabilities as part of the process of establishing itself as a major cloud services provider. Microsoft Services describes key elements of that paradigm change...
on
22 Mar 2012
Wiki Page:
SharePoint 2010 Architectures
techChirag
SharePoint Server 2010 comprises of three architecture areas that are inter-related in the design and deployment of implementation. Physical Architecture Hardware configuration broken down into a three tier model: - Web Front End for web applications. - Application for managing and serving...
on
21 Mar 2012
Wiki Page:
Operations Guide for A Solution for Private Cloud Security
Thomas W Shinder - MSFT
Welcome to this third paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the operations perspective and offers guidance for operating security within a private cloud environment. In some areas, specific products are discussed in relation to the security...
on
24 Feb 2012
Wiki Page:
Measured Services Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution, what can I do to ensure that only legitimate users are using the private cloud resources? Security Functionality Part of the answer to the question above is addressed in the On-demand Self-Service section earlier in this paper. That section discussed...
on
17 Jan 2012
Wiki Page:
Rapid Elasticity Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution: How do I detect and respond to requests for resources that might negatively impact other tenant applications or the whole cloud? What impact does the private cloud have on my plans to maintain the availability and capacity of resources? ...
on
17 Jan 2012
Wiki Page:
On Demand Self Service Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution: How do I monitor and audit the use of the services hosted in the cloud? If I don't know what I've got, how do I make sure that it's secure? What happens if the wrong people request or de-provision resources? How does the private cloud...
on
17 Jan 2012
Wiki Page:
Broad Network Access Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution, I want to be sure that an appropriate level of security applies regardless of where the client is connecting from and regardless of the device form factor. This requirement applies to both cloud management and application security. Security Functionality...
on
17 Jan 2012
Wiki Page:
Resource Pooling Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution: How can I detect any breaches in isolation between tenants' resources and how do I respond to the situation? How do I design my disaster recovery procedures to ensure isolation? What impact does the private cloud have on my plans for maintaining...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Operations Principles
Thomas W Shinder - MSFT
This section introduces the key operational security principles for private clouds. These principles apply to all the detailed security design recommendations that are discussed in subsequent sections. Note: In the following discussions, we use the term "tenant" to refer to a client or...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges - Measured Services
Thomas W Shinder - MSFT
As a designer of a private cloud, I want to want to ensure that all applications and services running in the cloud are measured and accounted for. Security Functionality Figure 1 lists a number of security capabilities that the security wrapper should include in the private cloud such as...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges - Broad Network Access
Thomas W Shinder - MSFT
As a designer of a private cloud solution, I want my solution to provide appropriate authentication and authorization services for the broad range of users accessing the cloud. Different services have different security requirements, such as different levels of security, access from multiple locations...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges - Resource Pooling
Thomas W Shinder - MSFT
As a designer of a private cloud solution that uses a pool of resources that can be allocated to many different tenants, how can I ensure the proper isolation of resources (network, compute, memory, storage) between tenants? Security Functionality Figure 1 lists a number of security capabilities...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges
Thomas W Shinder - MSFT
The previous section outlined the cloud security design principles that should apply at all levels of the private cloud design. This section examines the key attributes that characterize cloud architectures: resource pooling, broad network access, on-demand self-service, rapid elasticity, and measured...
on
17 Jan 2012
Page 2 of 3 (56 items)
1
2
3
Can't find it? Write it!
Post an Article