Vai al contenuto principale della pagina

Enterprise directory and security implementation guide [electronic resource] : designing and implementing directories in your organization / Charles Carrington ... [et al.].



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Enterprise directory and security implementation guide [electronic resource] : designing and implementing directories in your organization / Charles Carrington ... [et al.]. Visualizza cluster
Pubblicazione: San Diego, Calif. : Academic Press, c2002
Descrizione fisica: xxvi, 238 p. : ill. ; 24 cm.
Disciplina: 005.8
Soggetto topico: Computer security equipment industry - Directories
Electronic commerce - Directories
Soggetto genere / forma: Electronic books.
Altri autori: Carrington, Charles.author  
Note generali: Includes index.
Nota di contenuto: Foreword -- Acknowledgments -- Company Copyright Notices and Statements -- Chapter 1Introduction -- Chapter 2Directories, Security, and TigersOh, My! -- Chapter 3Directory Architecture -- Chapter 4More on LDAP -- Chapter 5Directories Within the Enterprise -- Chapter 6Implementation Considerations for the Enterprise Directory -- Chapter 7Enterprise Security -- Chapter 8The Security Strategy -- Chapter 9PKCS, PKIX, and LDAP -- Chapter 10Enterprise Security Scenarios -- Chapter 11Enterprise Security and Security Deployment Planning -- Glossary -- Index.
Sommario/riassunto: The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with "best practices" on directory architecture, implementation, and enterprise security strategies.
Eiproduzione: Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2007. Mode of access: World Wide Web. System requirements: Web browser. Title from title screen (viewed on July 25, 2007). Access may be restricted to users at subscribing institutions.
ISBN: 9780121604523
0121604527
Formato: Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 991003243639707536
Lo trovi qui: Univ. del Salento
Localizzazioni e accesso elettronico http://www.sciencedirect.com/science/book/9780121604523
http://catdir.loc.gov/catdir/description/els031/2002100202.html
http://www.loc.gov/catdir/toc/fy035/2002100202.html
Opac: Controlla la disponibilità qui
Serie: The Korper and Ellis e-commerce books series
Altra ed. diverso supporto: Original 0121604527 9780121604523 (DLC) 2002100202 (OCoLC)50422301