Wonder Club world wonders pyramid logo
×

Security in Distributed Computing: Did You Lock the Door? Book

Security in Distributed Computing: Did You Lock the Door?
Be the First to Review this Item at Wonderclub
X
Security in Distributed Computing: Did You Lock the Door?, 18290-7 Practical techniques for securing distributed computing systems. Computing security is, at its core, more than a technical issue: It's a fundamental business challenge. Managers have plenty of security alternatives, but little real guidance , Security in Distributed Computing: Did You Lock the Door?
out of 5 stars based on 0 reviews
5
0 %
4
0 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Security in Distributed Computing: Did You Lock the Door?
  • Written by author Rob Dempsey, Glen Bruce
  • Published by Prentice Hall, 1996/10/09
  • 18290-7 Practical techniques for securing distributed computing systems. Computing security is, at its core, more than a technical issue: It's a fundamental business challenge. Managers have plenty of security alternatives, but little real guidance
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Foreword
Preface
Acknowledgements
Introduction
Ch. 1 Computing Security - A Business Issue 3
Ch. 2 Distributed Security Challenges 19
Ch. 3 Computing Security Basics 33
Ch. 4 Security Architecture 45
Ch. 5 Foundations 59
Ch. 6 Security Policy 71
Ch. 7 The Network 93
Ch. 8 Network Operating Systems 117
Ch. 9 Client/Server and Middleware 129
Ch. 10 UNIX Security 145
Ch. 11 More UNIX Security 167
Ch. 12 UNIX Solutions 187
Ch. 13 Windows NT Security 205
Ch. 14 The Internet 219
Ch. 15 Cryptography 239
Ch. 16 The DCE Environment 255
Ch. 17 DCE Security Concepts 265
Ch. 18 Distributed Database 279
Ch. 19 On-Line Transaction Processing 295
Ch. 20 Secure Applications 317
Ch. 21 Implementation Examples 329
Ch. 22 Security Management 343
Ch. 23 Developing a Security Strategy 361
Ch. 24 Auditing 375
Ch. 25 The Future 393
Appendix A Strong Authentication 401
Appendix B Smart Cards 407
Appendix C Personal Computer Security 413
Appendix D Remote Access 419
Glossary 423
References 437
Index 443


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Security in Distributed Computing: Did You Lock the Door?, 18290-7
Practical techniques for securing distributed computing systems.
Computing security is, at its core, more than a technical issue: It's a fundamental business challenge. Managers have plenty of security alternatives, but little real guidance , Security in Distributed Computing: Did You Lock the Door?

X
WonderClub Home

This item is in your Collection

Security in Distributed Computing: Did You Lock the Door?, 18290-7
Practical techniques for securing distributed computing systems.
Computing security is, at its core, more than a technical issue: It's a fundamental business challenge. Managers have plenty of security alternatives, but little real guidance , Security in Distributed Computing: Did You Lock the Door?

Security in Distributed Computing: Did You Lock the Door?

X
WonderClub Home

This Item is in Your Inventory

Security in Distributed Computing: Did You Lock the Door?, 18290-7
Practical techniques for securing distributed computing systems.
Computing security is, at its core, more than a technical issue: It's a fundamental business challenge. Managers have plenty of security alternatives, but little real guidance , Security in Distributed Computing: Did You Lock the Door?

Security in Distributed Computing: Did You Lock the Door?

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: