Enterprise directory and security implementation guide designing and implementing directories in your organization /

The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise...

Πλήρης περιγραφή

Άλλοι συγγραφείς: Carrington, Charles
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: San Diego, Calif. : Academic Press, c2002.
Σειρά: Korper and Ellis e-commerce books series.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9780121604523
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 02558nam a2200289 a 4500
001 1/44810
008 140701s2002 us 001 0 eng
020 |a 9780121604523 
020 |a 0121604527 
035 |l 47764 
040 |a OPELS  |b eng  |c OPELS  |d OCLCQ  |d OCLCF  |d GR-PeUP 
245 0 0 |a Enterprise directory and security implementation guide  |h [electronic resource] :  |b designing and implementing directories in your organization /  |c Charles Carrington ... [et al.]. 
260 |a San Diego, Calif. :  |b Academic Press,  |c c2002. 
300 |a 1 online resource (xxvi, 238 p.) :  |b ill. 
490 1 |a The Korper and Ellis e-commerce books series 
520 |a The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with "best practices" on directory architecture, implementation, and enterprise security strategies. 
505 0 |a Foreword -- Acknowledgments -- Company Copyright Notices and Statements -- Chapter 1Introduction -- Chapter 2Directories, Security, and TigersOh, My! -- Chapter 3Directory Architecture -- Chapter 4More on LDAP -- Chapter 5Directories Within the Enterprise -- Chapter 6Implementation Considerations for the Enterprise Directory -- Chapter 7Enterprise Security -- Chapter 8The Security Strategy -- Chapter 9PKCS, PKIX, and LDAP -- Chapter 10Enterprise Security Scenarios -- Chapter 11Enterprise Security and Security Deployment Planning -- Glossary -- Index. 
500 |a Includes index. 
650 4 |a Computer security equipment industry  |v Directories. 
650 4 |a Electronic commerce  |v Directories. 
655 4 |a Electronic books. 
700 1 |a Carrington, Charles  |q (Charles Dudley) 
830 0 |a Korper and Ellis e-commerce books series. 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20140701  |p 00b47764  |q 00b47764  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9780121604523 
856 4 |d /webopac/covers/03/47764_9780121604523.jpg 
856 4 |d /webopac/covers/03/47764_0121604527.jpg