64,40 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Jason Garman is currently working with computer forensics for the national defense and intelligence communities at Aegis Research Corporation. Previously, he worked at several biotech firms in the Washington, DC area where he helped clients design and implement secure yet easy to use research networks. Jason enjoys working with the practical application of tools and techniques to solve computer and network security problems.
Preface;
Organization of This Book;
Conventions Used in This Book;
Comments and Questions;
Thanks...;
Chapter 1: Introduction;
1.1 Origins;
1.2 What Is Kerberos?;
1.3 Goals;
1.4 Evolution;
1.5 Other Products;
Chapter 2: Pieces of the Puzzle;
2.1 The Three As;
2.2 Directories;
2.3 Privacy and Integrity;
2.4 Kerberos Terminology and Concepts;
2.5 Putting the Pieces Together;
Chapter 3: Protocols;
3.1 The Needham-Schroeder Protocol;
3.2 Kerberos 4;
3.3 Kerberos 5;
3.4 The Alphabet Soup of Kerberos-Related Protocols;
Chapter 4: Implementation;
4.1 The Basic Steps;
4.2 Planning Your Installation;
4.3 Before You Begin;
4.4 KDC Installation;
4.5 DNS and Kerberos;
4.6 Client and Application Server Installation;
Chapter 5: Troubleshooting;
5.1 A Quick Decision Tree;
5.2 Debugging Tools;
5.3 Errors and Solutions;
Chapter 6: Security;
6.1 Kerberos Attacks;
6.2 Protocol Security Issues;
6.3 Security Solutions;
6.4 Protecting Your KDC;
6.5 Firewalls, NAT, and Kerberos;
6.6 Auditing;
Chapter 7: Applications;
7.1 What Does Kerberos Support Mean?;
7.2 Services and Keytabs;
7.3 Transparent Kerberos Login with PAM;
7.4 Mac OS X and the Login Window;
7.5 Kerberos and Web-Based Applications;
7.6 The Simple Authentication and Security Layer (SASL);
7.7 Kerberos-Enabled Server Packages;
7.8 Kerberos-Enabled Client Packages;
7.9 More Kerberos-Enabled Packages;
Chapter 8: Advanced Topics;
8.1 Cross-Realm Authentication;
8.2 Using Kerberos 4 Services with Kerberos 5;
8.3 Windows Issues;
8.4 Windows and Unix Interoperability;
Chapter 9: Case Study;
9.1 The Organization;
9.2 Planning;
9.3 Implementation;
Chapter 10: Kerberos Futures;
10.1 Public Key Extensions;
10.2 Smart Cards;
10.3 Better Encryption;
10.4 Kerberos Referrals;
10.5 Web Services;
Administration Reference;
MIT;
Configuration File Format;
Colophon;
Erscheinungsjahr: | 2003 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
XIV
253 S. |
ISBN-13: | 9780596004033 |
ISBN-10: | 0596004036 |
UPC: | 636920004035 |
EAN: | 0636920004035 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Garman, Jason |
Hersteller: |
O'Reilly Media
O'Reilly and Associates |
Verantwortliche Person für die EU: | dpunkt.verlag GmbH, Vanessa Niethammer, Wieblinger Weg 17, D-69123 Heidelberg, hallo@dpunkt.de |
Maße: | 235 x 179 x 14 mm |
Von/Mit: | Jason Garman |
Erscheinungsdatum: | 30.09.2003 |
Gewicht: | 0,458 kg |
Jason Garman is currently working with computer forensics for the national defense and intelligence communities at Aegis Research Corporation. Previously, he worked at several biotech firms in the Washington, DC area where he helped clients design and implement secure yet easy to use research networks. Jason enjoys working with the practical application of tools and techniques to solve computer and network security problems.
Preface;
Organization of This Book;
Conventions Used in This Book;
Comments and Questions;
Thanks...;
Chapter 1: Introduction;
1.1 Origins;
1.2 What Is Kerberos?;
1.3 Goals;
1.4 Evolution;
1.5 Other Products;
Chapter 2: Pieces of the Puzzle;
2.1 The Three As;
2.2 Directories;
2.3 Privacy and Integrity;
2.4 Kerberos Terminology and Concepts;
2.5 Putting the Pieces Together;
Chapter 3: Protocols;
3.1 The Needham-Schroeder Protocol;
3.2 Kerberos 4;
3.3 Kerberos 5;
3.4 The Alphabet Soup of Kerberos-Related Protocols;
Chapter 4: Implementation;
4.1 The Basic Steps;
4.2 Planning Your Installation;
4.3 Before You Begin;
4.4 KDC Installation;
4.5 DNS and Kerberos;
4.6 Client and Application Server Installation;
Chapter 5: Troubleshooting;
5.1 A Quick Decision Tree;
5.2 Debugging Tools;
5.3 Errors and Solutions;
Chapter 6: Security;
6.1 Kerberos Attacks;
6.2 Protocol Security Issues;
6.3 Security Solutions;
6.4 Protecting Your KDC;
6.5 Firewalls, NAT, and Kerberos;
6.6 Auditing;
Chapter 7: Applications;
7.1 What Does Kerberos Support Mean?;
7.2 Services and Keytabs;
7.3 Transparent Kerberos Login with PAM;
7.4 Mac OS X and the Login Window;
7.5 Kerberos and Web-Based Applications;
7.6 The Simple Authentication and Security Layer (SASL);
7.7 Kerberos-Enabled Server Packages;
7.8 Kerberos-Enabled Client Packages;
7.9 More Kerberos-Enabled Packages;
Chapter 8: Advanced Topics;
8.1 Cross-Realm Authentication;
8.2 Using Kerberos 4 Services with Kerberos 5;
8.3 Windows Issues;
8.4 Windows and Unix Interoperability;
Chapter 9: Case Study;
9.1 The Organization;
9.2 Planning;
9.3 Implementation;
Chapter 10: Kerberos Futures;
10.1 Public Key Extensions;
10.2 Smart Cards;
10.3 Better Encryption;
10.4 Kerberos Referrals;
10.5 Web Services;
Administration Reference;
MIT;
Configuration File Format;
Colophon;
Erscheinungsjahr: | 2003 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
XIV
253 S. |
ISBN-13: | 9780596004033 |
ISBN-10: | 0596004036 |
UPC: | 636920004035 |
EAN: | 0636920004035 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Garman, Jason |
Hersteller: |
O'Reilly Media
O'Reilly and Associates |
Verantwortliche Person für die EU: | dpunkt.verlag GmbH, Vanessa Niethammer, Wieblinger Weg 17, D-69123 Heidelberg, hallo@dpunkt.de |
Maße: | 235 x 179 x 14 mm |
Von/Mit: | Jason Garman |
Erscheinungsdatum: | 30.09.2003 |
Gewicht: | 0,458 kg |