Bild 1 von 1

Galerie
Bild 1 von 1

Ähnlichen Artikel verkaufen?
Kerberos: Ein Netzwerkauthen tifizierungssy stem von Tung, Brian
by Tung, Brian | PB | Good
US $7,53
Ca.CHF 5,99
Artikelzustand:
“Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, ”... Mehr erfahrenÜber den Artikelzustand
Gut
Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr geringfügige Beschädigungen auf, wie z.B. kleinere Schrammen, er hat aber weder Löcher, noch ist er eingerissen. Bei gebundenen Büchern ist der Schutzumschlag möglicherweise nicht mehr vorhanden. Die Bindung weist geringfügige Gebrauchsspuren auf. Die Mehrzahl der Seiten ist unbeschädigt, das heißt, es gibt kaum Knitter oder Einrisse, es wurden nur in geringem Maße Bleistiftunterstreichungen im Text vorgenommen, es gibt keine Textmarkierungen und die Randbereiche sind nicht beschrieben. Alle Seiten sind vollständig vorhanden. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers.
2 verfügbar
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos Economy Shipping.
Standort: Aurora, Illinois, USA
Lieferung:
Lieferung zwischen Di, 29. Jul und Fr, 1. Aug nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Verkäufer zahlt Rückversand.
Zahlungen:
Sicher einkaufen
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:146386205243
Artikelmerkmale
- Artikelzustand
- Gut
- Hinweise des Verkäufers
- Binding
- Paperback
- Book Title
- Kerberos
- Weight
- 0 lbs
- Product Group
- Book
- IsTextBook
- No
- ISBN
- 9780201379242
Über dieses Produkt
Product Identifiers
Publisher
Addison Wesley Professional
ISBN-10
0201379244
ISBN-13
9780201379242
eBay Product ID (ePID)
560767
Product Key Features
Number of Pages
192 Pages
Language
English
Publication Name
Kerberos : a Network Authentication System
Publication Year
1999
Subject
Networking / Vendor Specific, Networking / General, Security / Networking
Type
Textbook
Subject Area
Computers
Series
The Addison-Wesley Networking Basics Ser.
Format
Trade Paperback
Dimensions
Item Height
0.5 in
Item Weight
6.4 Oz
Item Length
8.2 in
Item Width
5.5 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
99-020766
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Preface xi. 1. Overview: A Kerberos FAQ. What Is Kerberos?What Is Kerberos Good For?What Versions Are Available?Where Can I Get Kerberos?What On-Line Information Is There?How Is Kerberos Used for Security? 2. Kerberos for Users. Using Kerberos.Manipulating Credentials.Changing Your Kerberos Password.Performing Basic Kerberos Operations.Using MIT-Kerberized Applications.Encrypting Your Session.Forwarding Tickets.Specifying the User.Knowing When Something Isn't Right.Using the Windows 95/NT Interface.Using Eudora. 3. Kerberos for Administrators. Knowing What You're Trying to Protect.Building the Kerberos Distribution.Installing the KDC.The krb5.conf Configuration File.The kdc.conf Configuration File.Creating the Kerberos Database.Setting Up the Administrative Principals.Starting the KDC and the Admin Server.Accessing the Database.Adding a New Principal.Deleting a Principal.Modifying a Principal.Changing a Password.Retrieving a Principal's Database Entry.Listing the Database Entries.Compiling a Keytab File.Removing Principals from a Keytab File.Finding Out What Commands Are Available.Quitting.Setting Up Cross-Realm Authentication.Administering an Application Server. 4. Kerberos for Developers. Contents of a Kerberized Application.Example of a Kerberized Application.The Client.The Server.Extensible Function Calls.Error Handling.Replay Caches.A Password-Changing Program.Other Kerberos API Calls.GSS-API.Understanding How the GSS-API Calls Work.Taking Advantage of GSS-API. 5. The Basics of Kerberos. The Origins of Kerberos.Principals.A Primer on Cryptography.Ciphers.One-Way Hashes.Authentication with Kerberos.The (High-Level) Details.Mutual Authentication.KDC = AS + TGS.Cross-Realm Authentication.The Kerberos Environment.A Note about Passwords.Local Security. 6. Other Versions of Kerberos. Pre-V5 and Commercial Versions.Kerberos V1, V2, V3.Kerberos V4.Bones, E-Bones, and Heimdal.TrustBroker.V4 and V5 Operational Differences.kinit.klist.kdestroy.V4 and V5 Anatomical Differences.Byte Ordering.Ticket Lifetimes.Delegation.Password Hashing.Preauthentication.Cryptographic Algorithms. 7. New Directions for Kerberos. Public Key Cryptography.The Basics of Public Key Cryptography.The Strength of Public Key Cryptography.Public Key Certification.Effect on the Kerberos Protocol.Use in Cross-Realm Authentication.Public Key Kerberos Today.Kerberos and Windows 2000.Smart Cards and Other Portable Devices.Smart Cards and PC Cards.PC Cards and the Kerberos Protocol. Appendix A. Glossary. Appendix B. Annotated Bibliography. Books.Papers.Internet Specifications.On-Line References. Index. 0201379244T04062001
Synopsis
This handbook is a complete step-by-step guide to working with Kerberos, one of the most popular network authentication systems used by network administrators and programmers. Kerberos provides a clear explanation of network security principles and basic concepts, while taking you through each element of the Kerberos system. Written by a network security professional who has worked with Kerberos extensively, this practical guide reveals the experience-based tips that will help you avoid pitfalls and maximize the systems capabilities. The text shows you how to obtain, install, optimize, use, and administer Kerberos, and covers important information for developing Kerberized applications. You will find thorough explanations of such key topics as: *Basic cryptography and hash functions *Mutual authentication *Establishing and changing passwords *Manipulating credentials *Installing the Key Distribution Center (KDC) *Optimizing configuration *Creating and administering a Kerberos database *Adding, deleting, and modifying a principal *Setting up cross-realm authentication *Extensible function calls *The GSS-API *The various versions of Kerberos and their operational differences In addit, Kerberos authentication offers a proven, non-proprietary solution for maximizing the security of virtually any computing system without compromising performance. This is the first authoritative, accessible guide to Kerberos for both users and administrators. Authored by Brian Tung, who wrote the Internet's #1 Kerberos web site, this book brings together everything you need to understand, deploy, use, and manage Kerberos servers. Tung presents a remarkably clear explanation of Kerberos components, algorithms, and protocols, plus a full chapter on developing Kerberized applications. Finally, preview the exciting future of Kerberos, including integration with public-key cryptography, smart cards, and Windows 2000.
LC Classification Number
TK5105.59.T86 1999
Artikelbeschreibung des Verkäufers
Info zu diesem Verkäufer
ThriftBooks
98,9% positive Bewertungen•19.7 Mio. Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (5'687'528)
- l***l (1121)- Bewertung vom Käufer.Letzter MonatBestätigter KaufBook is in good condition. Exactly what I was expecting.
- _***7 (110)- Bewertung vom Käufer.Letzter MonatBestätigter KaufAll good!
- o***g (2079)- Bewertung vom Käufer.Letzter MonatBestätigter KaufExcellent item fast shipping
Noch mehr entdecken:
- Brian Herbert Belletristik-Bücher,
- Patrick-O - ' - Brian-Belletristik-Bücher,
- Patrick-O - ' - Brian-Taschenbuch-Belletristik-Bücher,
- Brian-Herbert-Taschenbuch-Belletristik - Bücher,
- Robert-A. - Heinlein-Belletristik-Bücher,
- Michael-A. - Singer-Sachbuch Bücher,
- Deutsche Bücher Robert-A. - Heinlein-Belletristik,
- Robert-A. - Heinlein-Taschenbuch-Belletristik-Bücher,
- James-A. - Michener-Belletristik-Bücher,
- Michael-A. - Singer-Taschenbuch-Sachbuch Bücher