Skip to content

Security in Distributed Computing Did You Lock the Door?

Best in textbook rentals since 2012!

ISBN-10: 0131829084

ISBN-13: 9780131829084

Edition: 1997

Authors: Rob Dempsey, Glen Bruce

List price: $73.32
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

For software developers and architects, project leaders and managers of distributed systems; system administrators; network administrators; and security officers. In today's distributed computing environment, there are serious security issues which must be addressed before trust can be placed in these systems. This book reveals the security and integrity problems of PCs, OS/2, Windows NT and UNIX systems, and shows how to effectively employ the exciting new distributed technologies of Kerberos, SNMP Monitors and Alerts, Encina and CICS to regain trust in the distributed environment.
Customers also bought

Book details

List price: $73.32
Copyright year: 1997
Publisher: Prentice Hall PTR
Publication date: 10/9/1996
Binding: Paperback
Pages: 480
Size: 7.50" wide x 9.50" long x 1.00" tall
Weight: 1.496
Language: English

Foreword
Preface
Acknowledgments
Introduction
Understanding The Problem
Computing Security A Business Issue
Business Drivers
Business Issues
Summary
Distributed Security Challenges
Stories
Security Issues
The Top Ten List
Conclusions
Foundations
Computing Security Basics
What is Security? Trust
What Is It? Trust
Why Do We Need It?
Summary
Security Architecture
Foundation
Trust
Control
Summary
Foundations
Principles
Security Policy Framework
Security Criteria
Summary
Security Policy
Security Policy Framework
Example of a Policy
The Process of Creating Policies
Summary
Technologies
The Network
A Tale of Two Networks
Systems Network Architecture
Introducing TCP/IP
SNA versus TCP/IP Security
Conclusions
Network Operating Systems
About Network Operating Systems?
Issues Surrounding NOS Implementations
Conclusions
Client/Server and Middleware
Client/Server
Middleware
Enabling Technology
Distributed Objects
Things to Watch Out For
Summary
UNIX Security
Why has UNIX Such a Bad Reputation for Security? UNIX Security
Typical Abuses
Conclusions
More UNIX Security
UNIX Network Services
A Burglar's Tools
Conclusions
UNIX Solutions
Control Monitors
Conclusions
Windows NT Security
Security Controls
Networking
Conclusions
The Internet
What is the Internet?
Internet Firewall
Conclusions
Cryptography
Private Key Encryption
Public Key Encryption
Encryption Issues
Digital Signature
Summary
The DCE Environment
What is DCE?
Concerns about DCE
Conclusions
DCE Security Concepts
DCE Authentication
Authorization
Is DCE Bulletproof?
Conclusions
Distributed Database
What is a RDBMS?
Different Models to Enable Applications
Issues Surrounding RDBMS
What is a Data Warehouse?
Conclusions
On-Line Transaction Processing
What Is a Transaction?
Components of a Transaction Processing System
The Top Five List
Summary
Solving The Problem
Secure Applications
Concepts
System Development Life Cycle
Summary
Implementation Examples
Electronic Mail
Lotus Notes
What's Next
Summary
Security Management
System Management
Network Management
Conclusions
Developing a Security Strategy
A Security Strategy
The Security Strategy Roadmap
Conclusions
Auditing
What Is an Audit?
What Role Should Audit Play?
Sample Criteria for a UNIX Audit
The Basics of Computer Auditing
Expanding the Focus
Other Types of Audits
Conclusions
The Future
Strong Authentication
Smart Cards
Personal Computer Security Viruses
Personal Computer Access Controls
How Far Should Security Be Extended?
Conclusions
Remote Access
Glossary
References
Index