Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
34,00 €
Versandkostenfrei per Post / DHL
Aktuell nicht verfügbar
Kategorien:
Beschreibung
Dedication;
Preface;
Organization of This Book;
Conventions Used in This Book;
Comments and Questions;
Thanks...;
Chapter 1: Introduction;
1.1 Origins;
1.2 What Is Kerberos?;
1.3 Goals;
1.4 Evolution;
1.5 Other Products;
Chapter 2: Pieces of the Puzzle;
2.1 The Three As;
2.2 Directories;
2.3 Privacy and Integrity;
2.4 Kerberos Terminology and Concepts;
2.5 Putting the Pieces Together;
Chapter 3: Protocols;
3.1 The Needham-Schroeder Protocol;
3.2 Kerberos 4;
3.3 Kerberos 5;
3.4 The Alphabet Soup of Kerberos-Related Protocols;
Chapter 4: Implementation;
4.1 The Basic Steps;
4.2 Planning Your Installation;
4.3 Before You Begin;
4.4 KDC Installation;
4.5 DNS and Kerberos;
4.6 Client and Application Server Installation;
Chapter 5: Troubleshooting;
5.1 A Quick Decision Tree;
5.2 Debugging Tools;
5.3 Errors and Solutions;
Chapter 6: Security;
6.1 Kerberos Attacks;
6.2 Protocol Security Issues;
6.3 Security Solutions;
6.4 Protecting Your KDC;
6.5 Firewalls, NAT, and Kerberos;
6.6 Auditing;
Chapter 7: Applications;
7.1 What Does Kerberos Support Mean?;
7.2 Services and Keytabs;
7.3 Transparent Kerberos Login with PAM;
7.4 Mac OS X and the Login Window;
7.5 Kerberos and Web-Based Applications;
7.6 The Simple Authentication and Security Layer (SASL);
7.7 Kerberos-Enabled Server Packages;
7.8 Kerberos-Enabled Client Packages;
7.9 More Kerberos-Enabled Packages;
Chapter 8: Advanced Topics;
8.1 Cross-Realm Authentication;
8.2 Using Kerberos 4 Services with Kerberos 5;
8.3 Windows Issues;
8.4 Windows and Unix Interoperability;
Chapter 9: Case Study;
9.1 The Organization;
9.2 Planning;
9.3 Implementation;
Chapter 10: Kerberos Futures;
10.1 Public Key Extensions;
10.2 Smart Cards;
10.3 Better Encryption;
10.4 Kerberos Referrals;
10.5 Web Services;
Administration Reference;
MIT;
Configuration File Format;
Colophon;
Preface;
Organization of This Book;
Conventions Used in This Book;
Comments and Questions;
Thanks...;
Chapter 1: Introduction;
1.1 Origins;
1.2 What Is Kerberos?;
1.3 Goals;
1.4 Evolution;
1.5 Other Products;
Chapter 2: Pieces of the Puzzle;
2.1 The Three As;
2.2 Directories;
2.3 Privacy and Integrity;
2.4 Kerberos Terminology and Concepts;
2.5 Putting the Pieces Together;
Chapter 3: Protocols;
3.1 The Needham-Schroeder Protocol;
3.2 Kerberos 4;
3.3 Kerberos 5;
3.4 The Alphabet Soup of Kerberos-Related Protocols;
Chapter 4: Implementation;
4.1 The Basic Steps;
4.2 Planning Your Installation;
4.3 Before You Begin;
4.4 KDC Installation;
4.5 DNS and Kerberos;
4.6 Client and Application Server Installation;
Chapter 5: Troubleshooting;
5.1 A Quick Decision Tree;
5.2 Debugging Tools;
5.3 Errors and Solutions;
Chapter 6: Security;
6.1 Kerberos Attacks;
6.2 Protocol Security Issues;
6.3 Security Solutions;
6.4 Protecting Your KDC;
6.5 Firewalls, NAT, and Kerberos;
6.6 Auditing;
Chapter 7: Applications;
7.1 What Does Kerberos Support Mean?;
7.2 Services and Keytabs;
7.3 Transparent Kerberos Login with PAM;
7.4 Mac OS X and the Login Window;
7.5 Kerberos and Web-Based Applications;
7.6 The Simple Authentication and Security Layer (SASL);
7.7 Kerberos-Enabled Server Packages;
7.8 Kerberos-Enabled Client Packages;
7.9 More Kerberos-Enabled Packages;
Chapter 8: Advanced Topics;
8.1 Cross-Realm Authentication;
8.2 Using Kerberos 4 Services with Kerberos 5;
8.3 Windows Issues;
8.4 Windows and Unix Interoperability;
Chapter 9: Case Study;
9.1 The Organization;
9.2 Planning;
9.3 Implementation;
Chapter 10: Kerberos Futures;
10.1 Public Key Extensions;
10.2 Smart Cards;
10.3 Better Encryption;
10.4 Kerberos Referrals;
10.5 Web Services;
Administration Reference;
MIT;
Configuration File Format;
Colophon;
Dedication;
Preface;
Organization of This Book;
Conventions Used in This Book;
Comments and Questions;
Thanks...;
Chapter 1: Introduction;
1.1 Origins;
1.2 What Is Kerberos?;
1.3 Goals;
1.4 Evolution;
1.5 Other Products;
Chapter 2: Pieces of the Puzzle;
2.1 The Three As;
2.2 Directories;
2.3 Privacy and Integrity;
2.4 Kerberos Terminology and Concepts;
2.5 Putting the Pieces Together;
Chapter 3: Protocols;
3.1 The Needham-Schroeder Protocol;
3.2 Kerberos 4;
3.3 Kerberos 5;
3.4 The Alphabet Soup of Kerberos-Related Protocols;
Chapter 4: Implementation;
4.1 The Basic Steps;
4.2 Planning Your Installation;
4.3 Before You Begin;
4.4 KDC Installation;
4.5 DNS and Kerberos;
4.6 Client and Application Server Installation;
Chapter 5: Troubleshooting;
5.1 A Quick Decision Tree;
5.2 Debugging Tools;
5.3 Errors and Solutions;
Chapter 6: Security;
6.1 Kerberos Attacks;
6.2 Protocol Security Issues;
6.3 Security Solutions;
6.4 Protecting Your KDC;
6.5 Firewalls, NAT, and Kerberos;
6.6 Auditing;
Chapter 7: Applications;
7.1 What Does Kerberos Support Mean?;
7.2 Services and Keytabs;
7.3 Transparent Kerberos Login with PAM;
7.4 Mac OS X and the Login Window;
7.5 Kerberos and Web-Based Applications;
7.6 The Simple Authentication and Security Layer (SASL);
7.7 Kerberos-Enabled Server Packages;
7.8 Kerberos-Enabled Client Packages;
7.9 More Kerberos-Enabled Packages;
Chapter 8: Advanced Topics;
8.1 Cross-Realm Authentication;
8.2 Using Kerberos 4 Services with Kerberos 5;
8.3 Windows Issues;
8.4 Windows and Unix Interoperability;
Chapter 9: Case Study;
9.1 The Organization;
9.2 Planning;
9.3 Implementation;
Chapter 10: Kerberos Futures;
10.1 Public Key Extensions;
10.2 Smart Cards;
10.3 Better Encryption;
10.4 Kerberos Referrals;
10.5 Web Services;
Administration Reference;
MIT;
Configuration File Format;
Colophon;
Preface;
Organization of This Book;
Conventions Used in This Book;
Comments and Questions;
Thanks...;
Chapter 1: Introduction;
1.1 Origins;
1.2 What Is Kerberos?;
1.3 Goals;
1.4 Evolution;
1.5 Other Products;
Chapter 2: Pieces of the Puzzle;
2.1 The Three As;
2.2 Directories;
2.3 Privacy and Integrity;
2.4 Kerberos Terminology and Concepts;
2.5 Putting the Pieces Together;
Chapter 3: Protocols;
3.1 The Needham-Schroeder Protocol;
3.2 Kerberos 4;
3.3 Kerberos 5;
3.4 The Alphabet Soup of Kerberos-Related Protocols;
Chapter 4: Implementation;
4.1 The Basic Steps;
4.2 Planning Your Installation;
4.3 Before You Begin;
4.4 KDC Installation;
4.5 DNS and Kerberos;
4.6 Client and Application Server Installation;
Chapter 5: Troubleshooting;
5.1 A Quick Decision Tree;
5.2 Debugging Tools;
5.3 Errors and Solutions;
Chapter 6: Security;
6.1 Kerberos Attacks;
6.2 Protocol Security Issues;
6.3 Security Solutions;
6.4 Protecting Your KDC;
6.5 Firewalls, NAT, and Kerberos;
6.6 Auditing;
Chapter 7: Applications;
7.1 What Does Kerberos Support Mean?;
7.2 Services and Keytabs;
7.3 Transparent Kerberos Login with PAM;
7.4 Mac OS X and the Login Window;
7.5 Kerberos and Web-Based Applications;
7.6 The Simple Authentication and Security Layer (SASL);
7.7 Kerberos-Enabled Server Packages;
7.8 Kerberos-Enabled Client Packages;
7.9 More Kerberos-Enabled Packages;
Chapter 8: Advanced Topics;
8.1 Cross-Realm Authentication;
8.2 Using Kerberos 4 Services with Kerberos 5;
8.3 Windows Issues;
8.4 Windows and Unix Interoperability;
Chapter 9: Case Study;
9.1 The Organization;
9.2 Planning;
9.3 Implementation;
Chapter 10: Kerberos Futures;
10.1 Public Key Extensions;
10.2 Smart Cards;
10.3 Better Encryption;
10.4 Kerberos Referrals;
10.5 Web Services;
Administration Reference;
MIT;
Configuration File Format;
Colophon;
Details
| Erscheinungsjahr: | 2003 |
|---|---|
| Genre: | Informatik |
| Rubrik: | Naturwissenschaften & Technik |
| Medium: | Taschenbuch |
| Inhalt: |
XIV
253 S. |
| ISBN-13: | 9780596004033 |
| ISBN-10: | 0596004036 |
| Sprache: | Englisch |
| Einband: | Kartoniert / Broschiert |
| Autor: | Garman, Jason |
| Auflage: | 1/2003 |
| Hersteller: |
O'Reilly
in der Rheinwerk Verlag GmbH |
| Verantwortliche Person für die EU: | dpunkt.verlag GmbH, Vanessa Niethammer, Wieblinger Weg 17, D-69123 Heidelberg, hallo@dpunkt.de |
| Maße: | 233 x 178 x 15 mm |
| Von/Mit: | Jason Garman |
| Erscheinungsdatum: | 16.09.2003 |
| Gewicht: | 0,448 kg |