Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization Contributor(s): Carrington, Charles (Author), Speed, Tim (Author), Ellis, Juanita (Author) |
|
ISBN: 0121604527 ISBN-13: 9780121604523 Publisher: Academic Press OUR PRICE: $88.06 Product Type: Paperback - Other Formats Published: August 2002 Annotation: The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with "best practices" on directory architecture, implementation, and enterprise security strategies. |
Additional Information |
BISAC Categories: - Computers | Networking - General - Computers | Internet - General - Computers | Security - General |
Dewey: 005.8 |
LCCN: 2002100202 |
Series: Korper and Ellis E-Commerce Books |
Physical Information: 0.51" H x 7.34" W x 9.32" (1.03 lbs) 272 pages |
Descriptions, Reviews, Etc. |
Publisher Description: The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential hackers. If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with best practices on directory architecture, implementation, and enterprise security strategies. |