UID:
almahu_9948026710402882
Umfang:
1 online resource (265 p.)
ISBN:
1-281-00513-4
,
9786611005139
,
0-08-049126-X
Serie:
The Korper and Ellis e-commerce books series
Inhalt:
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential ""hackers."" If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance.This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories
Anmerkung:
Includes index.
,
Front Cover; Enterprise Directory and Security Implementation Guide; Copyright Page; Contents; Foreword; Acknowledgments; Company Copyright Notices and Statements; Chapter 1. Introduction; 1.1 Directories; 1.2 X.500 and LDAP; Chapter 2. Directories, Security, and Tigers-Oh, My!; 2.1 Directory Types; 2.2 Directory Uses; 2.3 Directory Security; Chapter 3. Directory Architecture; 3.1 Architecture Defined; 3.2 Critical Elements; 3.3 Implementations-Products and Vendors; 3.4 DAP and LDAP; References; Chapter 4. More on LDAP; 4.1 Referrals; 4.2 Authentication and Authorization; 4.3 X.500; 4.4 X.509
,
4.5 LDIFChapter 5. Directories Within the Enterprise; 5.1 Historical Perspective; 5.2 Directories and Privacy; 5.3 Directories and NOS/OS; 5.4 Directories and Messaging; Chapter 6. Implementation Considerations for the Enterprise Directory; 6.1 Directory Content, Design, DIT, and Attributes; 6.2 Authoritative Sources of the Directory Information; 6.3 Uniqueness Criteria; 6.4 Directory Aggregation; Chapter 7. Enterprise Security; 7.1 Bolt-on Security; 7.2 Process Security; 7.3 Competitive Asset; 7.4 Physical Security Policy; 7.5 Network Security Policy; 7.6 Acceptable Use Policy
,
Chapter 8. The Security Strategy8.1 The Security Committee; 8.2 The Corporate Security Policy Document; Chapter 9. PKCS, PKIX, and LDAP; 9.1 The Public-Private Key; 9.2 The CRL; 9.3 The LDAP; 9.4 Public-Key Cryptography Standards; 9.5 Cylink; 9.6 Certification Practice Statement; Chapter 10. Enterprise Security Scenarios; 10.1 Filtered Directory; 10.2 The 100 Percent LDAP Solution; Chapter 11. Enterprise Security and Security Deployment Planning; 11.1 Security Planning; 11.2 Security Hardware and Software Reference Guide; Glossary; Index
,
English
Weitere Ausg.:
ISBN 0-12-160452-7
Sprache:
Englisch