Coverart for item
The Resource Enterprise directory and security implementation guide : designing and implementing directories in your organization, Charles Carrington [and others]

Enterprise directory and security implementation guide : designing and implementing directories in your organization, Charles Carrington [and others]

Label
Enterprise directory and security implementation guide : designing and implementing directories in your organization
Title
Enterprise directory and security implementation guide
Title remainder
designing and implementing directories in your organization
Statement of responsibility
Charles Carrington [and others]
Contributor
Subject
Genre
Language
eng
Summary
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that opera
Member of
Cataloging source
N$T
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
HD9696.25.A2
LC item number
E58 2002eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • directories
http://library.link/vocab/relatedWorkOrContributorName
Carrington, Charles
Series statement
The Korper and Ellis e-commerce books series
http://library.link/vocab/subjectName
  • Computer security equipment industry
  • Electronic commerce
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Computer security equipment industry
  • Electronic commerce
Label
Enterprise directory and security implementation guide : designing and implementing directories in your organization, Charles Carrington [and others]
Instantiates
Publication
Note
Includes index
Antecedent source
unknown
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Foreword -- Acknowledgments -- Company Copyright Notices and Statements -- Chapter 1Introduction -- Chapter 2Directories, Security, and TigersOh, My! -- Chapter 3Directory Architecture -- Chapter 4More on LDAP -- Chapter 5Directories Within the Enterprise -- Chapter 6Implementation Considerations for the Enterprise Directory -- Chapter 7Enterprise Security -- Chapter 8The Security Strategy -- Chapter 9PKCS, PKIX, and LDAP -- Chapter 10Enterprise Security Scenarios -- Chapter 11Enterprise Security and Security Deployment Planning -- Glossary -- Index
Control code
156208687
Dimensions
unknown
Extent
1 online resource (xxvi, 238 pages)
File format
unknown
Form of item
online
Isbn
9780121604523
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)156208687
Label
Enterprise directory and security implementation guide : designing and implementing directories in your organization, Charles Carrington [and others]
Publication
Note
Includes index
Antecedent source
unknown
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Foreword -- Acknowledgments -- Company Copyright Notices and Statements -- Chapter 1Introduction -- Chapter 2Directories, Security, and TigersOh, My! -- Chapter 3Directory Architecture -- Chapter 4More on LDAP -- Chapter 5Directories Within the Enterprise -- Chapter 6Implementation Considerations for the Enterprise Directory -- Chapter 7Enterprise Security -- Chapter 8The Security Strategy -- Chapter 9PKCS, PKIX, and LDAP -- Chapter 10Enterprise Security Scenarios -- Chapter 11Enterprise Security and Security Deployment Planning -- Glossary -- Index
Control code
156208687
Dimensions
unknown
Extent
1 online resource (xxvi, 238 pages)
File format
unknown
Form of item
online
Isbn
9780121604523
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)156208687

Library Locations

    • Thomas Jefferson LibraryBorrow it
      1 University Blvd, St. Louis, MO, 63121, US
      38.710138 -90.311107
Processing Feedback ...