Practical Intranet Security: Overview of the State of the Art and Available Technologies

Portada
Springer Science & Business Media, 31 ene 1999 - 244 páginas
Foreword by Lars Knudsen
Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, the new security architecture SESAME, which builds on the Kerberos authentication system, adding to it both public-key technology and a role-based access control service. Other technologies are also included such as a description of how to program with the GSS-API, and modern security technologies such as PGP, S/MIME, SSH, SSL IPSEC and CDSA. The book concludes with a comparison of the technologies.
This book is different from other network security books in that its aim is to identify how to secure an organization's intranet. Previously books have concentrated on the Internet, often neglecting issues relating to securing intranets. However the potential risk to business and the ease by which intranets can be violated is often far greater than via the Internet.
The aim is that network administrators and managers can get the information that they require to make informed choices on strategy and solutions for securing their own intranets.
The book is an invaluable reference for network managers and network administrators whose responsibility it is to ensure the security of an organization's intranet. The book also contains background reading on networking, network security and cryptography which makes it an excellent research reference and undergraduate/postgraduate text book.
 

Índice

IV
3
V
4
VII
5
X
6
XII
7
XIII
8
XVI
9
XVII
12
CXXXII
109
CXXXIV
111
CXXXVI
112
CXXXVII
113
CXXXIX
114
CXLI
117
CXLII
118
CXLIII
124

XIX
14
XX
15
XXI
16
XXIII
18
XXIV
19
XXV
20
XXVII
22
XXVIII
25
XXIX
28
XXX
29
XXXII
30
XXXVI
31
XXXVII
32
XXXIX
33
XLII
35
XLIV
36
XLVI
37
XLVIII
38
XLIX
39
L
40
LI
41
LII
42
LIV
45
LV
46
LVII
48
LIX
49
LX
50
LXI
51
LXII
52
LXIV
53
LXV
54
LXVI
55
LXVII
57
LXVIII
58
LXIX
59
LXX
61
LXXI
62
LXXII
63
LXXIV
64
LXXV
65
LXXVI
66
LXXVIII
67
LXXX
68
LXXXII
69
LXXXIII
70
LXXXV
71
LXXXVII
72
LXXXVIII
73
LXXXIX
74
XC
79
XCI
80
XCIII
82
XCIV
85
XCVI
86
XCVII
87
XCVIII
89
C
90
CII
91
CIV
92
CVII
93
CX
94
CXI
95
CXII
96
CXIII
98
CXV
99
CXVII
100
CXIX
101
CXXI
102
CXXIV
103
CXXVI
104
CXXVII
105
CXXX
106
CXXXI
108
CXLIV
127
CXLV
129
CXLVI
131
CXLVII
134
CXLVIII
136
CL
137
CLI
139
CLII
141
CLV
142
CLVII
144
CLVIII
145
CLX
146
CLXII
147
CLXIV
148
CLXVII
149
CLXVIII
150
CLXIX
151
CLXXI
152
CLXXII
153
CLXXIV
154
CLXXVI
159
CLXXVII
160
CLXXVIII
162
CLXXIX
163
CLXXXI
164
CLXXXII
165
CLXXXIII
166
CLXXXV
167
CLXXXVI
168
CLXXXVIII
169
CXCII
170
CXCV
171
CXCVI
172
CXCVII
173
CXCIX
174
CCI
175
CCIII
176
CCIV
177
CCV
178
CCVIII
179
CCIX
181
CCX
182
CCXII
183
CCXIII
184
CCXIV
186
CCXV
187
CCXVII
188
CCXX
189
CCXXI
191
CCXXIV
192
CCXXV
194
CCXXVI
195
CCXXVIII
196
CCXXX
197
CCXXXIII
198
CCXXXVI
199
CCXXXVIII
200
CCXLI
202
CCXLIII
203
CCXLV
204
CCXLVII
205
CCXLVIII
207
CCL
208
CCLII
210
CCLIII
211
CCLV
212
CCLVI
215
CCLVII
219
CCLVIII
220
CCLIX
223
CCLX
243
Página de créditos

Otras ediciones - Ver todo

Términos y frases comunes

Pasajes populares

Página 224 - To appear in, Proceedings of the 1st ACM Conference on Communications and Computing Security, Fairfax, Virginia, November 3-5, 1993.

Información bibliográfica