LEADER 00000cam a2200661Ia 4500 001 ocn156208687 003 OCoLC 005 20160527041209.2 006 m o d 007 cr cnu---unuuu 008 070717s2002 caua or 001 0 eng d 019 162129534|a507083152|a648303183|a856956200 020 9780080491264|q(electronic book) 020 008049126X|q(electronic book) 020 9780121604523 020 0121604527|q(Trade Paper) 035 (OCoLC)156208687|z(OCoLC)162129534|z(OCoLC)507083152 |z(OCoLC)648303183|z(OCoLC)856956200 037 |b00991439 040 N$T|beng|epn|cN$T|dOCLCQ|dYDXCP|dOCLCQ|dIDEBK|dZCU|dE7B |dOCLCQ|dMERUC|dOCLCQ|dOCLCO|dOCLCF|dNLGGC|dOCLCQ|dOPELS |dOCLCQ 049 RIDW 050 4 HD9696.25.A2|bE58 2002eb 072 7 COM|x060040|2bisacsh 072 7 COM|x043050|2bisacsh 072 7 COM|x053000|2bisacsh 082 04 005.8|222 090 HD9696.25.A2|bE58 2002eb 245 00 Enterprise directory and security implementation guide : |bdesigning and implementing directories in your organization /|cCharles Carrington [and others]. 264 1 San Diego, Calif. :|bAcademic Press,|c[2002] 264 4 |c©2002 300 1 online resource (xxvi, 238 pages) :|billustrations. 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 340 |gpolychrome|2rdacc 347 text file|2rdaft 490 1 The Korper and Ellis e-commerce books series 500 Includes index. 505 0 Foreword -- Acknowledgments -- Company Copyright Notices and Statements -- Chapter 1Introduction -- Chapter 2Directories, Security, and TigersOh, My! -- Chapter 3Directory Architecture -- Chapter 4More on LDAP -- Chapter 5Directories Within the Enterprise -- Chapter 6Implementation Considerations for the Enterprise Directory -- Chapter 7Enterprise Security -- Chapter 8The Security Strategy -- Chapter 9PKCS, PKIX, and LDAP -- Chapter 10Enterprise Security Scenarios -- Chapter 11Enterprise Security and Security Deployment Planning -- Glossary -- Index. 520 The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that opera. 588 0 Print version record. 590 eBooks on EBSCOhost|bEBSCO eBook Subscription Academic Collection - North America 650 0 Computer security equipment industry|0https://id.loc.gov/ authorities/subjects/sh92004015|vDirectories.|0https:// id.loc.gov/authorities/subjects/sh99001609 650 0 Electronic commerce|0https://id.loc.gov/authorities/ subjects/sh96008434|vDirectories.|0https://id.loc.gov/ authorities/subjects/sh99001609 650 7 Computer security equipment industry.|2fast|0https:// id.worldcat.org/fast/872497 650 7 Electronic commerce.|2fast|0https://id.worldcat.org/fast/ 906906 655 4 Electronic books. 655 7 Directories.|2fast|0https://id.worldcat.org/fast/1423796 655 7 Directories.|2lcgft|0https://id.loc.gov/authorities/ genreForms/gf2014026087 700 1 Carrington, Charles|q(Charles Dudley)|0https://id.loc.gov/ authorities/names/no2009176982 776 08 |iPrint version:|tEnterprise directory and security implementation guide.|dSan Diego, Calif. : Academic Press, ©2002|z0121604527|z9780121604523|w(DLC) 2002100202 |w(OCoLC)50422301 830 0 Korper and Ellis e-commerce books series.|0https:// id.loc.gov/authorities/names/no2001033599 856 40 |uhttps://rider.idm.oclc.org/login?url=http:// search.ebscohost.com/login.aspx?direct=true&scope=site& db=nlebk&AN=194984|zOnline eBook. Access restricted to current Rider University students, faculty, and staff. 856 42 |3Instructions for reading/downloading this eBook|uhttp:// guides.rider.edu/ebooks/ebsco 901 MARCIVE 20231220 948 |d20160615|cEBSCO|tebscoebooksacademic|lridw 994 92|bRID