Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books ... Korper and Ellis E-Commerce Books Series)
β Scribed by Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper
- Year
- 2002
- Tongue
- English
- Leaves
- 265
- Edition
- 1st
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance.This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with "best practices" on directory architecture, implementation, and enterprise security strategies.
π SIMILAR VOLUMES
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential ''hackers.'' If the directory structure is compromised, then the whole enterprise can be
E-commerce is mushrooming in both business-to-business and business-to- consumer sectors. It shakes the foundation of most industries, leads to entirely new kinds of businesses, and directly affects both our careers and the way we live. One of the most significant changes is the manner in which comp
To optimally design and manage a directory service, IS architects and managers must understand current state-of-the-art products. Directory Services covers Novell's NDS eDirectory, Microsoft's Active Directory, UNIX directories and products by NEXOR, MaxWare, Siemens, Critical Path and others. Direc
<span>βThis book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole process, starting from the theoretical framework, this book analyzes the gap between the current situa
βThis book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole process, starting from the theoretical framework, this book analyzes the gap between the current situation a