Welcome to UE Central Library

Keep Smiling

Secure networking with Windows 2000 and trust services (Record no. 16548)

MARC details
000 -LEADER
fixed length control field 07162cam a22002174a 4500
001 - CONTROL NUMBER
control field 12212555
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200903115346.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 001027s2001 maua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0201657783
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780201657784
040 ## - CATALOGING SOURCE
Transcribing agency DLC
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 21
Item number F2959
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Feghhi, Jalal.
245 10 - TITLE STATEMENT
Title Secure networking with Windows 2000 and trust services
Statement of responsibility, etc / Jalal Feghhi, Jalil Feghhi
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boston :
Name of publisher, distributor, etc Addison-Wesley,
Date of publication, distribution, etc 2001
300 ## - PHYSICAL DESCRIPTION
Extent xix, 364 p. :
Other physical details ill. ;
Dimensions 24 cm. +
Accompanying material 1 computer optical disc (4 3/4 in.)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Feghhi, Jalil,
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note (Each chapter concludes with a "Summary" and with "References.")Preface I. THE KERBEROS NETWORK AUTHENTICATION SERVICE. 1. The Kerberos Network Authentication Service. Basic Concepts of Kerberos.Passwords.Symmetric Keys.Key Distribution and Management.Single Sign-On.Kerberos Architecture.Time Stamps for Nonces.Preauthentication.Security Services.Different Views of Kerberos.Cross-Realm Authentication.Policy Configuration Options.Public Key Extensions.Initial Authentication.Cross-Realm Authentication.Limitations of Kerberos.Kerberos Tickets.Ticket Contents.Ticket Flags.Delegation of Authentication.Ticket-Granting Tickets.The Use of Network Addresses in Tickets.Authenticators for Tickets.The Kerberos Protocol.Authentication Service Exchange.Ticket-Granting Service Exchange.Client/Server Exchange.Summary.References.2. Kerberos in Windows 2000. Authentication: Kerberos versus NTLM.Scalability.Mutual Authentication.Support for Multitier Applications.Simplified Trust Management.Interoperability with Existing Trust Infrastructures.Smart Card Support.Windows 2000 Implementation of Kerberos.Key Distribution Center (KDC).Account Database.Kerberos Policy.Kerberos Security Support Provider.Credentials Cache.IP Transport.Authorization in Windows 2000.Access-Control Model.Preparation of Authorization Data by the KDC.Interactive Log-On in Windows 2000.Using a Password.Using a Smart Card.Summary.References.II. PUBLIC KEY TECHNOLOGY. 3. Public Key Technology. Overview of Cryptography.Symmetric Key Cryptography.Public Key Cryptography.Public Key Cryptography Schemes.Message Digest Algorithms.Digital Signatures.RSA Digital Signatures.DSS Digital Signatures.Elliptic Curve Digital Signatures.Key Length.Considerations for Symmetric Key Cryptosystems.Considerations for Public Key Cryptosystems.Digital Certificates.Cryptographic Authentication.Secure, Scalable Key Distribution.Client-Centric Processing.X.509 Digital Certificates.Encoding of Certificates.Certificate Revocation Lists (CRLs).Methods for Propagating CRL Information.X.509 CRLs.Certification Authorities.Certificate Enrollment.Subject Authentication.Certificate Generation, Distribution, and Revocation.Data Repositories.Public Key Infrastructures (PKIs).Structures among Multiple Certification Authorities.Certification Path Discovery and Validation.Summary.References.4. Public Key Technology in Windows 2000. Public Key Security.Secure E-Commerce: TLS/SSL.Supporting Distributed Business Partners: TLS/SSL Client-Side Authentication.Strong Network Authentication: Smart Cards.Distributing Authenticated Code: Authenticode 2.0.Laptop and Desktop File System Security: EFS.Secure E-Mail: S/MIME.Network-Level Secure Communications: IPsec.Public Key Security Architecture.CryptoAPI.Cryptographic Service Providers.Certificate Services.Public Key Infrastructure.Trust Models.Certificate Chain Building.Revocation Status Checking.Cryptographic Algorithms and Key Lengths.Hardware Support.Certificate Trust Lists.Public Key Infrastructure Standards.Interoperability with Third-Party PKIs.PKI to PKI.PKI to Application.Application to Application.Summary.References.5. Using Public Key Technology in Windows 2000. Designing a Certification Authority Structure.Factors Influencing the Design of a CA Structure.Models for Operating a Certification Authority.Models for CA Structures.Using Certificate Services.Enterprise versus Standalone Certification Authorities.Installing Certificate Services.Administering the Certificate Services CA.Certificate Enrollment for Users and Computers.Certificate Stores.Enrollment Using the Certificate Request Wizard.Web-Based Enrollment.Distribution of Root CA Certificates to Computers.Summary.References.III. IP SECURITY AND VIRTUAL PRIVATE NETWORKS. 6. IP Security (IPsec). IPsec Concepts.Security Protocols.Security Associations.Models for Combining AH and ESP Protocols.Points of Implementation.Limitations of IPsec and Performance Considerations.Key Management in IPsec.Internet Security Association and Key-Management Protocol (ISAKMP).Internet Key Exchange.Summary.References.7. Virtual Private Networks (VPNs). Basic Concepts.VPN Scenarios.Tunneling.Authentication, Authorization, Accounting, Auditing, and Alarming.Remote-Access Virtual Interfaces and Routing Considerations.Virtual Private Networking with L2TP/IPsec.L2TP/IPsec Two-Level Authentication.IPsec Confidentiality, Data Origin Authentication, and Integrity Services.L2TP/IPsec Packet Encapsulation.Remote-Access Authentication Protocols in Windows 2000.VPNs and Firewalls.VPN Server behind the Firewall.VPN Server in front of the Firewall.VPN Interoperability.Summary.References.8. Using IPsec and VPNs in Windows 2000. Using IPsec.IPsec Policies.Predefined IPsec Policies.Custom IPsec Policies.Using VPNs.Network Configuration.Domain Configuration.Security Configuration.Remote-Access Policy Configuration.Remote-Access Policies.Remote-Access Policy Conditions.Remote-Access Policy Permission.Remote-Access Policy Profile.Setting up VPNs.Remote-Access VPN Server Setup.VPN Client Setup.Router-to-Router VPN Connections.Summary.References.IV. TRUST BEYOND THE ENTERPRISE. 9. Extending Trust beyond the Enterprise. Local Registration Authorities.The LRA Model.LRA Deployment Models.VeriSign OnSite Service.Certificate Enrollment and Distribution.Certificate Management.Authentication Models.Controlling Access to the LRAA Web Site.Public versus Private Certification.Local Hosting.VerSign OnSite Automated Authentication Service.Networking of Local Trust Networks.VeriSign Gateway Service.VeriSign Go Secure! for Microsoft Exchange.Summary.References.10. Trust in Business-to-Business Marketplaces. B2B Net Marketplaces.Trust.Distributed Trust Management.Verifiable Trust.B2B Trust Services.Authentication.Payment.Validation.Summary.References.V. SECURE NETWORK PROGRAMMING IN WINDOWS 2000. 11. Kerberizing Applications Using Security Support Provider Interface. SSPI and Windows 2000 Security Architecture.SSPI Functions.Using SSPI.Impersonation and Delegation.Sample Project: Using SSPI to Kerberize Applications.Summary.References.12. Service Publication in Windows 2000 Active Directory. Service Publication and Connection Points.Service Connection Point (SCP).Host-Based Services.Replicable Services.Service Publication and Security.Service Principal Names.Sample Project: Using Connection Points for Service Publication.Summary. References. Appendix A. Glossary. Appendix B. Acronyms. Index. CD-Rom Warranty. 0201657783T04062001
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 03.12.2018 U.E.24152 005.8 F2959 T9702 03.12.2018 03.12.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk