O'Reilly - Kerberos The Definitive Guide.pdf
(
3133 KB
)
Pobierz
Contents
1. Unknown
2. Unknown
3. Unknown
4. Unknown
5. Unknown
6. Unknown
7. Unknown
8. Unknown
9. Unknown
10. Unknown
11. Unknown
12. Unknown
13. Unknown
14. Unknown
15. Unknown
16. Unknown
17. Unknown
18. Unknown
19. Unknown
20. Unknown
21. Unknown
22. Unknown
23. Unknown
24. Unknown
25. Unknown
26. Unknown
27. Unknown
28. Unknown
29. Unknown
30. Unknown
31. Unknown
32. Unknown
33. Unknown
34. Unknown
35. Unknown
36. Unknown
37. Unknown
38. Unknown
39. Unknown
40. Unknown
41. Unknown
42. Unknown
43. Unknown
44. Unknown
45. Unknown
46. Unknown
47. Unknown
48. Unknown
49. Unknown
50. Unknown
51. Unknown
52. Unknown
53. Unknown
54. Unknown
55. Unknown
56. Unknown
57. Unknown
58. Unknown
59. Unknown
60. Unknown
61. Unknown
62. Unknown
63. Unknown
64. Unknown
65. Unknown
66. Unknown
67. Unknown
68. Unknown
69. Unknown
70. Unknown
71. Unknown
72. Unknown
73. Unknown
74. Unknown
75. Unknown
76. Unknown
77. Unknown
78. Unknown
79. Unknown
80. Unknown
81. Unknown
82. Unknown
83. Unknown
84. Unknown
85. Unknown
86. Unknown
87. Unknown
88. Unknown
89. Unknown
90. Unknown
91. Unknown
92. Unknown
93. Unknown
94. Unknown
95. Unknown
96. Unknown
97. Unknown
98. Unknown
99. Unknown
100. Unknown
[ Team LiB ]
Table of Contents
Index
Reviews
Reader Reviews
Errata
Kerberos: The Definitive Guide
By
Jason Garman
Publisher: O'Reilly
Pub Date: August 2003
ISBN: 0-596-00403-6
Pages: 272
Single sign-on is the holy grail of network administration, and Kerberos is the only game in town.
Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the
reach of Kerberos to all networks large or small. Kerberos: The Definitive Guide shows you how to
implement Kerberos on Windows and Unix systems for secure authentication. In addition to covering
the basic principles behind cryptographic authentication, it covers everything from basic installation to
advanced topics like cross-realm authentication, defending against attacks on Kerberos, and
troubleshooting.
[ Team LiB ]
[ Team LiB ]
Table of Contents
Index
Reviews
Reader Reviews
Errata
Kerberos: The Definitive Guide
By
Jason Garman
Publisher: O'Reilly
Pub Date: August 2003
ISBN: 0-596-00403-6
Pages: 272
Dedication
Copyright
Preface
Organization of This Book
Conventions Used in This Book
Comments and Questions
Thanks...
Chapter 1. Introduction
Section 1.1. Origins
Section 1.2. What Is Kerberos?
Section 1.3. Goals
Section 1.4. Evolution
Section 1.5. Other Products
Chapter 2. Pieces of the Puzzle
Section 2.1. The Three As
Section 2.2. Directories
Section 2.3. Privacy and Integrity
Section 2.4. Kerberos Terminology and Concepts
Section 2.5. Putting the Pieces Together
Chapter 3. Protocols
Section 3.1.
Section 3.2.
Section 3.3.
Section 3.4.
The Needham-Schroeder Protocol
Kerberos 4
Kerberos 5
The Alphabet Soup of Kerberos-Related Protocols
Chapter 4. Implementation
Section 4.1. The Basic Steps
Section 4.2. Planning Your Installation
Section 4.3. Before You Begin
Section 4.4. KDC Installation
Section 4.5. DNS and Kerberos
Section 4.6. Client and Application Server Installation
Chapter 5. Troubleshooting
Section 5.1. A Quick Decision Tree
Section 5.2. Debugging Tools
Section 5.3. Errors and Solutions
Chapter 6. Security
Section 6.1. Kerberos Attacks
Section 6.2. Protocol Security Issues
Section 6.3. Security Solutions
Section 6.4. Protecting Your KDC
Section 6.5. Firewalls, NAT, and Kerberos
Section 6.6. Auditing
Chapter 7. Applications
Section 7.1. What Does Kerberos Support Mean?
Section 7.2. Services and Keytabs
Section 7.3. Transparent Kerberos Login with PAM
Section 7.4. Mac OS X and the Login Window
Section 7.5. Kerberos and Web-Based Applications
Section 7.6. The Simple Authentication and Security Layer (SASL)
Section 7.7. Kerberos-Enabled Server Packages
Section 7.8. Kerberos-Enabled Client Packages
Section 7.9. More Kerberos-Enabled Packages
Chapter 8. Advanced Topics
Section 8.1. Cross-Realm Authentication
Section 8.2. Using Kerberos 4 Services with Kerberos 5
Section 8.3. Windows Issues
Section 8.4. Windows and Unix Interoperability
Chapter 9. Case Study
Section 9.1. The Organization
Section 9.2. Planning
Section 9.3. Implementation
Chapter 10. Kerberos Futures
Section 10.1. Public Key Extensions
Section 10.2. Smart Cards
Plik z chomika:
Yohoho25
Inne pliki z tego folderu:
Andress - Surviving Security - How to Integrate People, Process and Technology 2e (Auerbach, 2004).chm
(3638 KB)
Bishop - Computer Security - Art And Science.chm
(2682 KB)
Biskup - Security in Computing Systems (Springer, 2009).pdf
(4790 KB)
Brancik - Insider Computer Fraud (Auerbach, 2008).pdf
(5046 KB)
Cranor - Security and Usability - Designing Secure Systems that People Can Use (OReilly, 2005).chm
(7768 KB)
Inne foldery tego chomika:
AI, Pattern matching, Data Modelling & Analysis
Algorithms & Data Structures
Computer Vision & Graphics & Image Processing
Game Programming
HDL Books - VHDL FPGA CPLD Verilog Digital Electronics eBook
Zgłoś jeśli
naruszono regulamin