Sold Out
Book Categories |
Foreword | ||
Preface | ||
Acknowledgements | ||
Introduction | ||
Ch. 1 | Computing Security - A Business Issue | 3 |
Ch. 2 | Distributed Security Challenges | 19 |
Ch. 3 | Computing Security Basics | 33 |
Ch. 4 | Security Architecture | 45 |
Ch. 5 | Foundations | 59 |
Ch. 6 | Security Policy | 71 |
Ch. 7 | The Network | 93 |
Ch. 8 | Network Operating Systems | 117 |
Ch. 9 | Client/Server and Middleware | 129 |
Ch. 10 | UNIX Security | 145 |
Ch. 11 | More UNIX Security | 167 |
Ch. 12 | UNIX Solutions | 187 |
Ch. 13 | Windows NT Security | 205 |
Ch. 14 | The Internet | 219 |
Ch. 15 | Cryptography | 239 |
Ch. 16 | The DCE Environment | 255 |
Ch. 17 | DCE Security Concepts | 265 |
Ch. 18 | Distributed Database | 279 |
Ch. 19 | On-Line Transaction Processing | 295 |
Ch. 20 | Secure Applications | 317 |
Ch. 21 | Implementation Examples | 329 |
Ch. 22 | Security Management | 343 |
Ch. 23 | Developing a Security Strategy | 361 |
Ch. 24 | Auditing | 375 |
Ch. 25 | The Future | 393 |
Appendix A | Strong Authentication | 401 |
Appendix B | Smart Cards | 407 |
Appendix C | Personal Computer Security | 413 |
Appendix D | Remote Access | 419 |
Glossary | 423 | |
References | 437 | |
Index | 443 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecurity in Distributed Computing: Did You Lock the Door?
X
This Item is in Your InventorySecurity in Distributed Computing: Did You Lock the Door?
X
You must be logged in to review the productsX
X
X
Add Security in Distributed Computing: Did You Lock the Door?, 18290-7 Practical techniques for securing distributed computing systems. Computing security is, at its core, more than a technical issue: It's a fundamental business challenge. Managers have plenty of security alternatives, but little real guidance , Security in Distributed Computing: Did You Lock the Door? to the inventory that you are selling on WonderClubX
X
Add Security in Distributed Computing: Did You Lock the Door?, 18290-7 Practical techniques for securing distributed computing systems. Computing security is, at its core, more than a technical issue: It's a fundamental business challenge. Managers have plenty of security alternatives, but little real guidance , Security in Distributed Computing: Did You Lock the Door? to your collection on WonderClub |