Welcome to UE Central Library

Keep Smiling

Secure networking with Windows 2000 and trust services / Jalal Feghhi, Jalil Feghhi

By: Contributor(s): Material type: TextTextPublication details: Boston : Addison-Wesley, 2001Description: xix, 364 p. : ill. ; 24 cm. + 1 computer optical disc (4 3/4 in.)ISBN:
  • 0201657783
  • 9780201657784
Subject(s): DDC classification:
  • 005.8 21 F2959
Contents:
(Each chapter concludes with a "Summary" and with "References.")Preface I. THE KERBEROS NETWORK AUTHENTICATION SERVICE. 1. The Kerberos Network Authentication Service. Basic Concepts of Kerberos.Passwords.Symmetric Keys.Key Distribution and Management.Single Sign-On.Kerberos Architecture.Time Stamps for Nonces.Preauthentication.Security Services.Different Views of Kerberos.Cross-Realm Authentication.Policy Configuration Options.Public Key Extensions.Initial Authentication.Cross-Realm Authentication.Limitations of Kerberos.Kerberos Tickets.Ticket Contents.Ticket Flags.Delegation of Authentication.Ticket-Granting Tickets.The Use of Network Addresses in Tickets.Authenticators for Tickets.The Kerberos Protocol.Authentication Service Exchange.Ticket-Granting Service Exchange.Client/Server Exchange.Summary.References.2. Kerberos in Windows 2000. Authentication: Kerberos versus NTLM.Scalability.Mutual Authentication.Support for Multitier Applications.Simplified Trust Management.Interoperability with Existing Trust Infrastructures.Smart Card Support.Windows 2000 Implementation of Kerberos.Key Distribution Center (KDC).Account Database.Kerberos Policy.Kerberos Security Support Provider.Credentials Cache.IP Transport.Authorization in Windows 2000.Access-Control Model.Preparation of Authorization Data by the KDC.Interactive Log-On in Windows 2000.Using a Password.Using a Smart Card.Summary.References.II. PUBLIC KEY TECHNOLOGY. 3. Public Key Technology. Overview of Cryptography.Symmetric Key Cryptography.Public Key Cryptography.Public Key Cryptography Schemes.Message Digest Algorithms.Digital Signatures.RSA Digital Signatures.DSS Digital Signatures.Elliptic Curve Digital Signatures.Key Length.Considerations for Symmetric Key Cryptosystems.Considerations for Public Key Cryptosystems.Digital Certificates.Cryptographic Authentication.Secure, Scalable Key Distribution.Client-Centric Processing.X.509 Digital Certificates.Encoding of Certificates.Certificate Revocation Lists (CRLs).Methods for Propagating CRL Information.X.509 CRLs.Certification Authorities.Certificate Enrollment.Subject Authentication.Certificate Generation, Distribution, and Revocation.Data Repositories.Public Key Infrastructures (PKIs).Structures among Multiple Certification Authorities.Certification Path Discovery and Validation.Summary.References.4. Public Key Technology in Windows 2000. Public Key Security.Secure E-Commerce: TLS/SSL.Supporting Distributed Business Partners: TLS/SSL Client-Side Authentication.Strong Network Authentication: Smart Cards.Distributing Authenticated Code: Authenticode 2.0.Laptop and Desktop File System Security: EFS.Secure E-Mail: S/MIME.Network-Level Secure Communications: IPsec.Public Key Security Architecture.CryptoAPI.Cryptographic Service Providers.Certificate Services.Public Key Infrastructure.Trust Models.Certificate Chain Building.Revocation Status Checking.Cryptographic Algorithms and Key Lengths.Hardware Support.Certificate Trust Lists.Public Key Infrastructure Standards.Interoperability with Third-Party PKIs.PKI to PKI.PKI to Application.Application to Application.Summary.References.5. Using Public Key Technology in Windows 2000. Designing a Certification Authority Structure.Factors Influencing the Design of a CA Structure.Models for Operating a Certification Authority.Models for CA Structures.Using Certificate Services.Enterprise versus Standalone Certification Authorities.Installing Certificate Services.Administering the Certificate Services CA.Certificate Enrollment for Users and Computers.Certificate Stores.Enrollment Using the Certificate Request Wizard.Web-Based Enrollment.Distribution of Root CA Certificates to Computers.Summary.References.III. IP SECURITY AND VIRTUAL PRIVATE NETWORKS. 6. IP Security (IPsec). IPsec Concepts.Security Protocols.Security Associations.Models for Combining AH and ESP Protocols.Points of Implementation.Limitations of IPsec and Performance Considerations.Key Management in IPsec.Internet Security Association and Key-Management Protocol (ISAKMP).Internet Key Exchange.Summary.References.7. Virtual Private Networks (VPNs). Basic Concepts.VPN Scenarios.Tunneling.Authentication, Authorization, Accounting, Auditing, and Alarming.Remote-Access Virtual Interfaces and Routing Considerations.Virtual Private Networking with L2TP/IPsec.L2TP/IPsec Two-Level Authentication.IPsec Confidentiality, Data Origin Authentication, and Integrity Services.L2TP/IPsec Packet Encapsulation.Remote-Access Authentication Protocols in Windows 2000.VPNs and Firewalls.VPN Server behind the Firewall.VPN Server in front of the Firewall.VPN Interoperability.Summary.References.8. Using IPsec and VPNs in Windows 2000. Using IPsec.IPsec Policies.Predefined IPsec Policies.Custom IPsec Policies.Using VPNs.Network Configuration.Domain Configuration.Security Configuration.Remote-Access Policy Configuration.Remote-Access Policies.Remote-Access Policy Conditions.Remote-Access Policy Permission.Remote-Access Policy Profile.Setting up VPNs.Remote-Access VPN Server Setup.VPN Client Setup.Router-to-Router VPN Connections.Summary.References.IV. TRUST BEYOND THE ENTERPRISE. 9. Extending Trust beyond the Enterprise. Local Registration Authorities.The LRA Model.LRA Deployment Models.VeriSign OnSite Service.Certificate Enrollment and Distribution.Certificate Management.Authentication Models.Controlling Access to the LRAA Web Site.Public versus Private Certification.Local Hosting.VerSign OnSite Automated Authentication Service.Networking of Local Trust Networks.VeriSign Gateway Service.VeriSign Go Secure! for Microsoft Exchange.Summary.References.10. Trust in Business-to-Business Marketplaces. B2B Net Marketplaces.Trust.Distributed Trust Management.Verifiable Trust.B2B Trust Services.Authentication.Payment.Validation.Summary.References.V. SECURE NETWORK PROGRAMMING IN WINDOWS 2000. 11. Kerberizing Applications Using Security Support Provider Interface. SSPI and Windows 2000 Security Architecture.SSPI Functions.Using SSPI.Impersonation and Delegation.Sample Project: Using SSPI to Kerberize Applications.Summary.References.12. Service Publication in Windows 2000 Active Directory. Service Publication and Connection Points.Service Connection Point (SCP).Host-Based Services.Replicable Services.Service Publication and Security.Service Principal Names.Sample Project: Using Connection Points for Service Publication.Summary. References. Appendix A. Glossary. Appendix B. Acronyms. Index. CD-Rom Warranty. 0201657783T04062001
List(s) this item appears in: Computer | Computer_2022
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books UE-Central Library 005.8 F2959 (Browse shelf(Opens below)) Available T9702

(Each chapter concludes with a "Summary" and with "References.")Preface I. THE KERBEROS NETWORK AUTHENTICATION SERVICE. 1. The Kerberos Network Authentication Service. Basic Concepts of Kerberos.Passwords.Symmetric Keys.Key Distribution and Management.Single Sign-On.Kerberos Architecture.Time Stamps for Nonces.Preauthentication.Security Services.Different Views of Kerberos.Cross-Realm Authentication.Policy Configuration Options.Public Key Extensions.Initial Authentication.Cross-Realm Authentication.Limitations of Kerberos.Kerberos Tickets.Ticket Contents.Ticket Flags.Delegation of Authentication.Ticket-Granting Tickets.The Use of Network Addresses in Tickets.Authenticators for Tickets.The Kerberos Protocol.Authentication Service Exchange.Ticket-Granting Service Exchange.Client/Server Exchange.Summary.References.2. Kerberos in Windows 2000. Authentication: Kerberos versus NTLM.Scalability.Mutual Authentication.Support for Multitier Applications.Simplified Trust Management.Interoperability with Existing Trust Infrastructures.Smart Card Support.Windows 2000 Implementation of Kerberos.Key Distribution Center (KDC).Account Database.Kerberos Policy.Kerberos Security Support Provider.Credentials Cache.IP Transport.Authorization in Windows 2000.Access-Control Model.Preparation of Authorization Data by the KDC.Interactive Log-On in Windows 2000.Using a Password.Using a Smart Card.Summary.References.II. PUBLIC KEY TECHNOLOGY. 3. Public Key Technology. Overview of Cryptography.Symmetric Key Cryptography.Public Key Cryptography.Public Key Cryptography Schemes.Message Digest Algorithms.Digital Signatures.RSA Digital Signatures.DSS Digital Signatures.Elliptic Curve Digital Signatures.Key Length.Considerations for Symmetric Key Cryptosystems.Considerations for Public Key Cryptosystems.Digital Certificates.Cryptographic Authentication.Secure, Scalable Key Distribution.Client-Centric Processing.X.509 Digital Certificates.Encoding of Certificates.Certificate Revocation Lists (CRLs).Methods for Propagating CRL Information.X.509 CRLs.Certification Authorities.Certificate Enrollment.Subject Authentication.Certificate Generation, Distribution, and Revocation.Data Repositories.Public Key Infrastructures (PKIs).Structures among Multiple Certification Authorities.Certification Path Discovery and Validation.Summary.References.4. Public Key Technology in Windows 2000. Public Key Security.Secure E-Commerce: TLS/SSL.Supporting Distributed Business Partners: TLS/SSL Client-Side Authentication.Strong Network Authentication: Smart Cards.Distributing Authenticated Code: Authenticode 2.0.Laptop and Desktop File System Security: EFS.Secure E-Mail: S/MIME.Network-Level Secure Communications: IPsec.Public Key Security Architecture.CryptoAPI.Cryptographic Service Providers.Certificate Services.Public Key Infrastructure.Trust Models.Certificate Chain Building.Revocation Status Checking.Cryptographic Algorithms and Key Lengths.Hardware Support.Certificate Trust Lists.Public Key Infrastructure Standards.Interoperability with Third-Party PKIs.PKI to PKI.PKI to Application.Application to Application.Summary.References.5. Using Public Key Technology in Windows 2000. Designing a Certification Authority Structure.Factors Influencing the Design of a CA Structure.Models for Operating a Certification Authority.Models for CA Structures.Using Certificate Services.Enterprise versus Standalone Certification Authorities.Installing Certificate Services.Administering the Certificate Services CA.Certificate Enrollment for Users and Computers.Certificate Stores.Enrollment Using the Certificate Request Wizard.Web-Based Enrollment.Distribution of Root CA Certificates to Computers.Summary.References.III. IP SECURITY AND VIRTUAL PRIVATE NETWORKS. 6. IP Security (IPsec). IPsec Concepts.Security Protocols.Security Associations.Models for Combining AH and ESP Protocols.Points of Implementation.Limitations of IPsec and Performance Considerations.Key Management in IPsec.Internet Security Association and Key-Management Protocol (ISAKMP).Internet Key Exchange.Summary.References.7. Virtual Private Networks (VPNs). Basic Concepts.VPN Scenarios.Tunneling.Authentication, Authorization, Accounting, Auditing, and Alarming.Remote-Access Virtual Interfaces and Routing Considerations.Virtual Private Networking with L2TP/IPsec.L2TP/IPsec Two-Level Authentication.IPsec Confidentiality, Data Origin Authentication, and Integrity Services.L2TP/IPsec Packet Encapsulation.Remote-Access Authentication Protocols in Windows 2000.VPNs and Firewalls.VPN Server behind the Firewall.VPN Server in front of the Firewall.VPN Interoperability.Summary.References.8. Using IPsec and VPNs in Windows 2000. Using IPsec.IPsec Policies.Predefined IPsec Policies.Custom IPsec Policies.Using VPNs.Network Configuration.Domain Configuration.Security Configuration.Remote-Access Policy Configuration.Remote-Access Policies.Remote-Access Policy Conditions.Remote-Access Policy Permission.Remote-Access Policy Profile.Setting up VPNs.Remote-Access VPN Server Setup.VPN Client Setup.Router-to-Router VPN Connections.Summary.References.IV. TRUST BEYOND THE ENTERPRISE. 9. Extending Trust beyond the Enterprise. Local Registration Authorities.The LRA Model.LRA Deployment Models.VeriSign OnSite Service.Certificate Enrollment and Distribution.Certificate Management.Authentication Models.Controlling Access to the LRAA Web Site.Public versus Private Certification.Local Hosting.VerSign OnSite Automated Authentication Service.Networking of Local Trust Networks.VeriSign Gateway Service.VeriSign Go Secure! for Microsoft Exchange.Summary.References.10. Trust in Business-to-Business Marketplaces. B2B Net Marketplaces.Trust.Distributed Trust Management.Verifiable Trust.B2B Trust Services.Authentication.Payment.Validation.Summary.References.V. SECURE NETWORK PROGRAMMING IN WINDOWS 2000. 11. Kerberizing Applications Using Security Support Provider Interface. SSPI and Windows 2000 Security Architecture.SSPI Functions.Using SSPI.Impersonation and Delegation.Sample Project: Using SSPI to Kerberize Applications.Summary.References.12. Service Publication in Windows 2000 Active Directory. Service Publication and Connection Points.Service Connection Point (SCP).Host-Based Services.Replicable Services.Service Publication and Security.Service Principal Names.Sample Project: Using Connection Points for Service Publication.Summary. References. Appendix A. Glossary. Appendix B. Acronyms. Index. CD-Rom Warranty. 0201657783T04062001

There are no comments on this title.

to post a comment.
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk