Security In Distributed Computing: Did You Lock the Door? - Softcover

Glen, Bruce; Rob, Dempsey

 
9780131829084: Security In Distributed Computing: Did You Lock the Door?

Inhaltsangabe

An end-to-end guide to safeguarding a company's information assets.KEY TOPICS:Identifies key issues in computer security, and the technologies that can help organizations respond. Presents guidance on developing a distributed systems architecture and methodology that is inherently more secure. Shows how to secure distributed transaction processing systems. Covers the human and organizational aspects of security. Discusses security issues that affect PCs, workstations and mainframes, with especially detailed coverage of UNIX security issues.MARKET:Anyone responsible for architecting, building, managing or auditing distributed computing applications, including software developers, project managers, system and network administrators, and security officers.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Über die Autorin bzw. den Autor

GLEN BRUCE and ROB DEMPSEY are consultants with the Hewlett-Packard Professional Services Organization, specializing in helping clients solve security issues in distributed computing and open systems.

Von der hinteren Coverseite


18290-7

Practical techniques for securing distributed computing systems.

Computing security is, at its core, more than a technical issue: It's a fundamental business challenge. Managers have plenty of security alternatives, but little real guidance on making intelligent decisions about them. And today's distributed, multivendor, Internet-connected environments encompass more insecure systems and networks than ever before.

Security in Distributed Computing offers the manager of distributed systems a thorough, common-sense framework for cost-effective computer security. Learn how to:

  • Develop distributed systems architectures and methodologies that are inherently more secure
  • Build trusted, Open-Systems-based distributed transaction processing systems
  • Evaluate cost vs. risk: What is worth securing, and at what price?
  • Consider human and organizational factors, so you can enhance security with minimum disruption to people and processes.

This book reviews critical risk areas in distributed systems, including networks, operating systems, applications, middleware, and the Internet. It considers the unique challenges of security in UNIX and Windows NT environments. And it presents detailed information about technologies that can help you respond, including:

  • Cryptography
  • The Kerberos authentication model
  • DCE security

Security in Distributed Computing also presents valuable, in-depth recommendations of how to design and implement a security strategy.

The more your organization comes to rely on distributed systems, the more important security will become. When you need to make important business decisions about security, you'll appreciate the practical advice and insight this book delivers.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.