Home > Computing and Information Technology > Computer networking and communications > Secure Networking With Windows 2000 and Trust Services
Secure Networking With Windows 2000 and Trust Services

Secure Networking With Windows 2000 and Trust Services

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Windows 2000 offers IT organizations a completely new security model and many new security technologies. In this book, two leading information security experts present hands-on projects and techniques for leveraging Windows 2000 security in any network environment -- intranet, extranet, Internet, VPN, or e-Commerce. The book offers detailed, practical coverage of securing sensitive resources using Kerberos, Public Key Infrastructure (PKI) technology, IPSec, Active Directory, and other Windows 2000 security technologies. Leading security professionals Jalal and Jalil Fegghi present each key Windows 2000 security protocol, review the tradeoffs associated with each approach, and guide network administrators to make the most appropriate choices for their environments. The book also includes detailed techniques for building secure Virtual Private Networks and e-Commerce sites and applications. For all Windows 2000 network/system administrators, IT executives and professionals, and power users concerned with security. The CD-ROM contains useful programs and code.

Table of Contents:
(Each chapter concludes with a “Summary” and with “References.”) Preface I. THE KERBEROS NETWORK AUTHENTICATION SERVICE. 1. The Kerberos Network Authentication Service. Basic Concepts of Kerberos. Passwords. Symmetric Keys. Key Distribution and Management. Single Sign-On. Kerberos Architecture. Time Stamps for Nonces. Preauthentication. Security Services. Different Views of Kerberos. Cross-Realm Authentication. Policy Configuration Options. Public Key Extensions. Initial Authentication. Cross-Realm Authentication. Limitations of Kerberos. Kerberos Tickets. Ticket Contents. Ticket Flags. Delegation of Authentication. Ticket-Granting Tickets. The Use of Network Addresses in Tickets. Authenticators for Tickets. The Kerberos Protocol. Authentication Service Exchange. Ticket-Granting Service Exchange. Client/Server Exchange. Summary. References. 2. Kerberos in Windows 2000. Authentication: Kerberos versus NTLM. Scalability. Mutual Authentication. Support for Multitier Applications. Simplified Trust Management. Interoperability with Existing Trust Infrastructures. Smart Card Support. Windows 2000 Implementation of Kerberos. Key Distribution Center (KDC). Account Database. Kerberos Policy. Kerberos Security Support Provider. Credentials Cache. IP Transport. Authorization in Windows 2000. Access-Control Model. Preparation of Authorization Data by the KDC. Interactive Log-On in Windows 2000. Using a Password. Using a Smart Card. Summary. References. II. PUBLIC KEY TECHNOLOGY. 3. Public Key Technology. Overview of Cryptography. Symmetric Key Cryptography. Public Key Cryptography. Public Key Cryptography Schemes. Message Digest Algorithms. Digital Signatures. RSA Digital Signatures. DSS Digital Signatures. Elliptic Curve Digital Signatures. Key Length. Considerations for Symmetric Key Cryptosystems. Considerations for Public Key Cryptosystems. Digital Certificates. Cryptographic Authentication. Secure, Scalable Key Distribution. Client-Centric Processing. X.509 Digital Certificates. Encoding of Certificates. Certificate Revocation Lists (CRLs). Methods for Propagating CRL Information. X.509 CRLs. Certification Authorities. Certificate Enrollment. Subject Authentication. Certificate Generation, Distribution, and Revocation. Data Repositories. Public Key Infrastructures (PKIs). Structures among Multiple Certification Authorities. Certification Path Discovery and Validation. Summary. References. 4. Public Key Technology in Windows 2000. Public Key Security. Secure E-Commerce: TLS/SSL. Supporting Distributed Business Partners: TLS/SSL Client-Side Authentication. Strong Network Authentication: Smart Cards. Distributing Authenticated Code: Authenticode 2.0. Laptop and Desktop File System Security: EFS. Secure E-Mail: S/MIME. Network-Level Secure Communications: IPsec. Public Key Security Architecture. CryptoAPI. Cryptographic Service Providers. Certificate Services. Public Key Infrastructure. Trust Models. Certificate Chain Building. Revocation Status Checking. Cryptographic Algorithms and Key Lengths. Hardware Support. Certificate Trust Lists. Public Key Infrastructure Standards. Interoperability with Third-Party PKIs. PKI to PKI. PKI to Application. Application to Application. Summary. References. 5. Using Public Key Technology in Windows 2000. Designing a Certification Authority Structure. Factors Influencing the Design of a CA Structure. Models for Operating a Certification Authority. Models for CA Structures. Using Certificate Services. Enterprise versus Standalone Certification Authorities. Installing Certificate Services. Administering the Certificate Services CA. Certificate Enrollment for Users and Computers. Certificate Stores. Enrollment Using the Certificate Request Wizard. Web-Based Enrollment. Distribution of Root CA Certificates to Computers. Summary. References. III. IP SECURITY AND VIRTUAL PRIVATE NETWORKS. 6. IP Security (IPsec). IPsec Concepts. Security Protocols. Security Associations. Models for Combining AH and ESP Protocols. Points of Implementation. Limitations of IPsec and Performance Considerations. Key Management in IPsec. Internet Security Association and Key-Management Protocol (ISAKMP). Internet Key Exchange. Summary. References. 7. Virtual Private Networks (VPNs). Basic Concepts. VPN Scenarios. Tunneling. Authentication, Authorization, Accounting, Auditing, and Alarming. Remote-Access Virtual Interfaces and Routing Considerations. Virtual Private Networking with L2TP/IPsec. L2TP/IPsec Two-Level Authentication. IPsec Confidentiality, Data Origin Authentication, and Integrity Services. L2TP/IPsec Packet Encapsulation. Remote-Access Authentication Protocols in Windows 2000. VPNs and Firewalls. VPN Server behind the Firewall. VPN Server in front of the Firewall. VPN Interoperability. Summary. References. 8. Using IPsec and VPNs in Windows 2000. Using IPsec. IPsec Policies. Predefined IPsec Policies. Custom IPsec Policies. Using VPNs. Network Configuration. Domain Configuration. Security Configuration. Remote-Access Policy Configuration. Remote-Access Policies. Remote-Access Policy Conditions. Remote-Access Policy Permission. Remote-Access Policy Profile. Setting up VPNs. Remote-Access VPN Server Setup. VPN Client Setup. Router-to-Router VPN Connections. Summary. References. IV. TRUST BEYOND THE ENTERPRISE. 9. Extending Trust beyond the Enterprise. Local Registration Authorities. The LRA Model. LRA Deployment Models. VeriSign OnSite Service. Certificate Enrollment and Distribution. Certificate Management. Authentication Models. Controlling Access to the LRAA Web Site. Public versus Private Certification. Local Hosting. VerSign OnSite Automated Authentication Service. Networking of Local Trust Networks. VeriSign Gateway Service. VeriSign Go Secure! for Microsoft Exchange. Summary. References. 10. Trust in Business-to-Business Marketplaces. B2B Net Marketplaces. Trust. Distributed Trust Management. Verifiable Trust. B2B Trust Services. Authentication. Payment. Validation. Summary. References. V. SECURE NETWORK PROGRAMMING IN WINDOWS 2000. 11. Kerberizing Applications Using Security Support Provider Interface. SSPI and Windows 2000 Security Architecture. SSPI Functions. Using SSPI. Impersonation and Delegation. Sample Project: Using SSPI to Kerberize Applications. Summary. References. 12. Service Publication in Windows 2000 Active Directory. Service Publication and Connection Points. Service Connection Point (SCP). Host-Based Services. Replicable Services. Service Publication and Security. Service Principal Names. Sample Project: Using Connection Points for Service Publication. Summary. References. Appendix A. Glossary. Appendix B. Acronyms. Index. CD-Rom Warranty. 0201657783T04062001


Best Sellers


Product Details
  • ISBN-13: 9780201657784
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison Wesley
  • Height: 235 mm
  • No of Pages: 384
  • Weight: 594 gr
  • ISBN-10: 0201657783
  • Publisher Date: 21 Feb 2001
  • Binding: SA
  • Language: English
  • Spine Width: 15 mm
  • Width: 186 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Secure Networking With Windows 2000 and Trust Services
Pearson Education (US) -
Secure Networking With Windows 2000 and Trust Services
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Secure Networking With Windows 2000 and Trust Services

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA