Enterprise Directory and Security Implementation Guide
Designing and Implementing Directories in Your Organization
Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper
Résumé
Enterprise directories are critical to both internal and external corporate communications and operations. They are a part of every organization and company around the world, having been integrated through applications such as phone, voice mail, paging, home and office e-mail, mobile e-mail, instant messaging, and fax. Enterprise directories act as a central repository, holding information about employees, customers, and even other resources such as conference rooms and equipment. Through the Internet, companies expose their directories to customers, business partners, and the hackers of the world. If a company's directory is compromised, the whole enterprise could be at risk.
Considering their importance, protecting directories against invasion can play a large role in e-commerce security. Written by authors who have helped corporations around the world to design and implement their directories, the Enterprise Director) and Security Implementation Guide provides examples, best practices, security strategies, and implementation guidelines for building secure and structured enterprise directories.
Contents
- Introduction
- Directories, Security, and Tigers-Oh, My!
- Directory Architecture
- More on LDAP
- Directories Within the Enterprise
- Implementation Considerations for the Enterprise Directory
- Enterprise Security
- The Security Strategy
- PKCS, PKIX, and LDAP
- Enterprise Security Scenarios
- Enterprise Security and Security Deployment Planning
L'auteur - Timothy Speed
Timothy Speed architecte certifié par IBM, s'occupe de la sécurité des systèmes de messagerie depuis 1992. Il travaille sur Lotus et a participé au montage des infrastructures de courrier pour les jeux olympiques de Nagano et de Sydney.
L'auteur - Juanita Ellis
Juanita Ellis was the lead Technical Architect in Lotus Consulting for the Southern, Mid Atlantic and Easter regions of the US. She was responsible for designing and architecting enterprise wide applications that integrated with Enterprise Resource Planning Systems, Internet technologies, relational and transaction based systems.
L'auteur - Steffano Korper
Steffano Korper has lectured in Networking and
Telecommunications courses for the University of Maryland,
University of Texas and was an Adjunct Professor of
Electrical Engineering at Southern Methodist University.
Industry experience includes Director of MIS for Wyndam
Hotels and Resorts and is currently Vice President of
E-Commerce Solutions at Going Beyond E-Commerce
Technologies, LLC.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Academic Press |
Auteur(s) | Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper |
Parution | 05/11/2002 |
Nb. de pages | 264 |
Format | 18,8 x 23,3 |
Couverture | Broché |
Poids | 466g |
Intérieur | Noir et Blanc |
EAN13 | 9780121604523 |
ISBN13 | 978-0-12-160452-3 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet