Gebraucht kaufen
EUR 1,75
+ EUR 3,00 Versandkosten
Gebraucht: Gut | Details
Verkauft von MEDIMOPS
Zustand: Gebraucht: Gut
Kommentar: medimops: schnell, sicher und zuverlässig
Ihren Artikel jetzt
eintauschen und
EUR 0,10 Gutschein erhalten.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Anhören Wird wiedergegeben... Angehalten   Sie hören eine Probe der Audible-Audioausgabe.
Weitere Informationen
Dieses Bild anzeigen

Secure Networking with Windows 2000 and Trust Services, w. CD-ROM (Englisch) Taschenbuch – Februar 2001


Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Amazon-Preis Neu ab Gebraucht ab
Taschenbuch
"Bitte wiederholen"
EUR 20,45 EUR 1,75
5 neu ab EUR 20,45 10 gebraucht ab EUR 1,75

Hinweise und Aktionen

  • Reduzierte Bestseller und Neuheiten: Entdecken Sie unsere vielseitige Auswahl an reduzierten Hörbüchern und englischen Büchern. Klicken Sie hier, um direkt zur Aktion zu gelangen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation


Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Produktbeschreibungen

Amazon.de

Another version of Windows, another way of thinking about security. Secure Networking with Windows 2000 and Trust Services explains how Windows 2000 interconnects users and resources, locally and across distances. With emphasis on extranets and virtual private networks (VPNs), this book is in large part an explanation of how to implement a public key infrastructure (PKI) with the services built into Windows 2000. In addition to providing a technically sound overview of Kerberos authentication and certificate management, the authors--two brothers who both specialize in PKI professionally--explain cryptography and IPsec, and show how to incorporate everything into various kinds of Windows 2000 networks.

The Feghhis' approach is somewhat academic, with loads of endnotes and lots of diagrams depicting message contents and trust relationships. That's not to say that this approach isn't practical, because after all, any implementation of security services has to be based on an understanding of what they do and why. Besides, the book provides exact instructions for setting up IPsec and VPN services in typical Windows 2000 environments, plus an interesting section on publishing services in Active Directory. Have a look at this one if you've never studied Kerberos, tunneling protocols, or certificate infrastructures, and you want your introduction to include lots of references to Windows specifics. --David Wall

Topics covered:

  • Windows 2000 security from administrator and architect perspectives
  • Kerberos authentication
  • Public key infrastructure (PKI)
  • IPsec
  • Virtual private networks (VPNs)
  • The Security Support Provider Interface (SSPI)

Synopsis

Windows 2000 offers IT organizations a completely new security model and many new security technologies. In this book, two leading information security experts present hands-on projects and techniques for leveraging Windows 2000 security in any network environment -- intranet, extranet, Internet, VPN, or e-Commerce. The book offers detailed, practical coverage of securing sensitive resources using Kerberos, Public Key Infrastructure (PKI) technology, IPSec, Active Directory, and other Windows 2000 security technologies. Leading security professionals Jalal and Jalil Fegghi present each key Windows 2000 security protocol, review the tradeoffs associated with each approach, and guide network administrators to make the most appropriate choices for their environments. The book also includes detailed techniques for building secure Virtual Private Networks and e-Commerce sites and applications. For all Windows 2000 network/system administrators, IT executives and professionals, and power users concerned with security. The CD-ROM contains useful programs and code.

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: 2 Rezensionen
2 von 2 Kunden fanden die folgende Rezension hilfreich
not thorough enough 28. September 2001
Von Moshe Wanounou - Veröffentlicht auf Amazon.com
Format: Taschenbuch
A friend of mine show me this book lately. I decided to read the book, even though i'm well trained windows 2000 security expert. I managed to read it twice from cover to cover in one week.
Well, the book is well suited for beginners and intermediate users, students (MCSE candidates), administrators, technical engineers and windows 2000 instructors.
The Book started well covering the Kerberos Protocol and then moving on to PKI,IPSec and VPN. Each technology deserves a book for itself. The Authors intended the book only for technologies overview therefore it's not a step-by-step guide. You'll not find real world tips and tricks while implementing those technologies in windows 2000. Even the registry is not mentioned once. I find the book informaive but the part of Windows 2000 lacks important information. The authors will better do if they will split the book to two parts - the first will cover all the security technologies presented in Windows 2000 and the other half dealing with implementation - step by step guide to successful implementation. Doesn't sound a bad idea, is it?
not thorough enough 28. September 2001
Von Moshe Wanounou - Veröffentlicht auf Amazon.com
Format: Taschenbuch
A friend of mine show me this book lately. I decided to read the book, even though i'm well trained windows 2000 security expert. I managed to read it twice from cover to cover in one week.
Well, the book is well suited for beginners and intermediate users, students (MCSE candidates), administrators, technical engineers and windows 2000 instructors.
The Book started well covering the Kerberos Protocol and then moving on to PKI,IPSec and VPN. Each technology deserves a book for itself. The Authors intended the book only for technologies overview therefore it's not a step-by-step guide. You'll not find real world tips and tricks while implementing those technologies in windows 2000. Even the registry is not mentioned once. I find the book informaive but the part of Windows 2000 lacks important information. The authors will better do if they will split the book to two parts - the first will cover all the security technologies presented in Windows 2000 and the other half dealing with implementation - step by step guide to successful implementation. Doesn't sound a bad idea, is it?
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.