LEADER 03439nam a2200421Ii 4500 001 991003243639707536 006 m d 007 cr cn||||||||| 008 070802s2002 caua sr 001 0 eng d 020 $a9780121604523 020 $a0121604527 035 $ab1365438x-39ule_inst 037 $a90469:90469$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a005.8$222 245 00$aEnterprise directory and security implementation guide$h[electronic resource] :$bdesigning and implementing directories in your organization /$cCharles Carrington ... [et al.]. 260 $aSan Diego, Calif. :$bAcademic Press,$cc2002. 300 $axxvi, 238 p. :$bill. ;$c24 cm. 440 4$aThe Korper and Ellis e-commerce books series 500 $aIncludes index. 505 0 $aForeword -- Acknowledgments -- Company Copyright Notices and Statements -- Chapter 1Introduction -- Chapter 2Directories, Security, and TigersOh, My! -- Chapter 3Directory Architecture -- Chapter 4More on LDAP -- Chapter 5Directories Within the Enterprise -- Chapter 6Implementation Considerations for the Enterprise Directory -- Chapter 7Enterprise Security -- Chapter 8The Security Strategy -- Chapter 9PKCS, PKIX, and LDAP -- Chapter 10Enterprise Security Scenarios -- Chapter 11Enterprise Security and Security Deployment Planning -- Glossary -- Index. 520 $aThe Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with "best practices" on directory architecture, implementation, and enterprise security strategies. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on July 25, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer security equipment industry$vDirectories. 650 0$aElectronic commerce$vDirectories. 655 7$aElectronic books.$2local 700 1 $aCarrington, Charles.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0173728 776 1 $cOriginal$z0121604527$z9780121604523$w(DLC) 2002100202$w(OCoLC)50422301 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9780121604523$zAn electronic book accessible through the World Wide Web; click for information 856 42$zPublisher description$uhttp://catdir.loc.gov/catdir/description/els031/2002100202.html 856 41$zTable of contents$uhttp://www.loc.gov/catdir/toc/fy035/2002100202.html 907 $a.b1365438x$b24-02-22$c24-01-08 912 $a991003243639707536 994 $aC0$bTEF 996 $aEnterprise directory and security implementation guide$91463958 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gcau$h0$i0