|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn156208687 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
070717s2002 caua or 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCQ
|d IDEBK
|d ZCU
|d E7B
|d OCLCQ
|d MERUC
|d OCLCQ
|d OCLCO
|d OCLCF
|d NLGGC
|d OCLCQ
|d OPELS
|d OCLCQ
|d AGLDB
|d STF
|d VNS
|d D6H
|d OCLCQ
|d VTS
|d OCLCQ
|d LEAUB
|d M8D
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 162129534
|a 507083152
|a 648303183
|a 856956200
|a 1035671615
|
020 |
|
|
|a 9780080491264
|q (electronic bk.)
|
020 |
|
|
|a 008049126X
|q (electronic bk.)
|
020 |
|
|
|a 9780121604523
|
020 |
|
|
|a 0121604527
|q (Trade Paper)
|
029 |
1 |
|
|a AU@
|b 000051556649
|
029 |
1 |
|
|a AU@
|b 000051859745
|
029 |
1 |
|
|a CHNEW
|b 001005076
|
029 |
1 |
|
|a DEBBG
|b BV042307435
|
029 |
1 |
|
|a DEBBG
|b BV043145298
|
029 |
1 |
|
|a DEBSZ
|b 405296371
|
029 |
1 |
|
|a DEBSZ
|b 422202398
|
029 |
1 |
|
|a GBVCP
|b 80230771X
|
029 |
1 |
|
|a NZ1
|b 12434113
|
035 |
|
|
|a (OCoLC)156208687
|z (OCoLC)162129534
|z (OCoLC)507083152
|z (OCoLC)648303183
|z (OCoLC)856956200
|z (OCoLC)1035671615
|
037 |
|
|
|b 00991439
|
050 |
|
4 |
|a HD9696.25.A2
|b E58 2002eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Enterprise directory and security implementation guide :
|b designing and implementing directories in your organization /
|c Charles Carrington [and others].
|
260 |
|
|
|a San Diego, Calif. :
|b Academic Press,
|c ©2002.
|
300 |
|
|
|a 1 online resource (xxvi, 238 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a The Korper and Ellis e-commerce books series
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that opera.
|
505 |
0 |
|
|a Foreword -- Acknowledgments -- Company Copyright Notices and Statements -- Chapter 1Introduction -- Chapter 2Directories, Security, and TigersOh, My! -- Chapter 3Directory Architecture -- Chapter 4More on LDAP -- Chapter 5Directories Within the Enterprise -- Chapter 6Implementation Considerations for the Enterprise Directory -- Chapter 7Enterprise Security -- Chapter 8The Security Strategy -- Chapter 9PKCS, PKIX, and LDAP -- Chapter 10Enterprise Security Scenarios -- Chapter 11Enterprise Security and Security Deployment Planning -- Glossary -- Index.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security equipment industry
|v Directories.
|
650 |
|
0 |
|a Electronic commerce
|v Directories.
|
650 |
|
6 |
|a Sécurité informatique
|x Appareils et matériel
|x Industrie
|v Répertoires.
|
650 |
|
6 |
|a Commerce électronique
|v Répertoires.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security equipment industry
|2 fast
|
650 |
|
7 |
|a Electronic commerce
|2 fast
|
655 |
|
2 |
|a Directory
|
655 |
|
7 |
|a directories.
|2 aat
|
655 |
|
7 |
|a Directories
|2 fast
|
655 |
|
7 |
|a Directories.
|2 lcgft
|
655 |
|
7 |
|a Répertoires.
|2 rvmgf
|
700 |
1 |
|
|a Carrington, Charles
|q (Charles Dudley)
|
776 |
0 |
8 |
|i Print version:
|t Enterprise directory and security implementation guide.
|d San Diego, Calif. : Academic Press, ©2002
|z 0121604527
|z 9780121604523
|w (DLC) 2002100202
|w (OCoLC)50422301
|
830 |
|
0 |
|a Korper and Ellis e-commerce books series.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=194984
|z Texto completo
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10186356
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 194984
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2586405
|
994 |
|
|
|a 92
|b IZTAP
|