Enterprise Directory and Security Implementation Guide - Charles... - Librairie Eyrolles
Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Enterprise Directory and Security Implementation Guide
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Enterprise Directory and Security Implementation Guide

Enterprise Directory and Security Implementation Guide

Designing and Implementing Directories in Your Organization

Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper

264 pages, parution le 05/11/2002

Résumé

Enterprise directories are critical to both internal and external corporate communications and operations. They are a part of every organization and company around the world, having been integrated through applications such as phone, voice mail, paging, home and office e-mail, mobile e-mail, instant messaging, and fax. Enterprise directories act as a central repository, holding information about employees, customers, and even other resources such as conference rooms and equipment. Through the Internet, companies expose their directories to customers, business partners, and the hackers of the world. If a company's directory is compromised, the whole enterprise could be at risk.

Considering their importance, protecting directories against invasion can play a large role in e-commerce security. Written by authors who have helped corporations around the world to design and implement their directories, the Enterprise Director) and Security Implementation Guide provides examples, best practices, security strategies, and implementation guidelines for building secure and structured enterprise directories.

Contents

  1. Introduction
  2. Directories, Security, and Tigers-Oh, My!
  3. Directory Architecture
  4. More on LDAP
  5. Directories Within the Enterprise
  6. Implementation Considerations for the Enterprise Directory
  7. Enterprise Security
  8. The Security Strategy
  9. PKCS, PKIX, and LDAP
  10. Enterprise Security Scenarios
  11. Enterprise Security and Security Deployment Planning

L'auteur - Timothy Speed

Timothy Speed architecte certifié par IBM, s'occupe de la sécurité des systèmes de messagerie depuis 1992. Il travaille sur Lotus et a participé au montage des infrastructures de courrier pour les jeux olympiques de Nagano et de Sydney.

L'auteur - Juanita Ellis

Juanita Ellis was the lead Technical Architect in Lotus Consulting for the Southern, Mid Atlantic and Easter regions of the US. She was responsible for designing and architecting enterprise wide applications that integrated with Enterprise Resource Planning Systems, Internet technologies, relational and transaction based systems.

L'auteur - Steffano Korper

Steffano Korper has lectured in Networking and Telecommunications courses for the University of Maryland, University of Texas and was an Adjunct Professor of Electrical Engineering at Southern Methodist University. Industry experience includes Director of MIS for Wyndam Hotels and Resorts and is currently Vice President of E-Commerce Solutions at Going Beyond E-Commerce Technologies, LLC.

Caractéristiques techniques

  PAPIER
Éditeur(s) Academic Press
Auteur(s) Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper
Parution 05/11/2002
Nb. de pages 264
Format 18,8 x 23,3
Couverture Broché
Poids 466g
Intérieur Noir et Blanc
EAN13 9780121604523
ISBN13 978-0-12-160452-3

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription