Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization: The Korper and Ellis E-Commerce Books Series
Autor Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korperen Limba Engleză Paperback – 7 sep 2002
This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with "best practices" on directory architecture, implementation, and enterprise security strategies.
Preț: 583.76 lei
Preț vechi: 729.70 lei
-20% Nou
Puncte Express: 876
Preț estimativ în valută:
111.73€ • 116.19$ • 93.49£
111.73€ • 116.19$ • 93.49£
Carte tipărită la comandă
Livrare economică 14-28 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780121604523
ISBN-10: 0121604527
Pagini: 272
Dimensiuni: 187 x 235 x 13 mm
Greutate: 0.47 kg
Editura: ELSEVIER SCIENCE
Seria The Korper and Ellis E-Commerce Books Series
ISBN-10: 0121604527
Pagini: 272
Dimensiuni: 187 x 235 x 13 mm
Greutate: 0.47 kg
Editura: ELSEVIER SCIENCE
Seria The Korper and Ellis E-Commerce Books Series
Public țintă
IT managers, CIOs, and computer security professionals.Cuprins
Foreword
Acknowledgments
Company Copyright Notices and Statements
Chapter 1—Introduction
Chapter 2—Directories, Security, and Tigers—Oh, My!
Chapter 3—Directory Architecture
Chapter 4—More on LDAP
Chapter 5—Directories Within the Enterprise
Chapter 6—Implementation Considerations for the Enterprise Directory
Chapter 7—Enterprise Security
Chapter 8—The Security Strategy
Chapter 9—PKCS, PKIX, and LDAP
Chapter 10—Enterprise Security Scenarios
Chapter 11—Enterprise Security and Security Deployment Planning
Glossary
Index
Acknowledgments
Company Copyright Notices and Statements
Chapter 1—Introduction
Chapter 2—Directories, Security, and Tigers—Oh, My!
Chapter 3—Directory Architecture
Chapter 4—More on LDAP
Chapter 5—Directories Within the Enterprise
Chapter 6—Implementation Considerations for the Enterprise Directory
Chapter 7—Enterprise Security
Chapter 8—The Security Strategy
Chapter 9—PKCS, PKIX, and LDAP
Chapter 10—Enterprise Security Scenarios
Chapter 11—Enterprise Security and Security Deployment Planning
Glossary
Index