You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A comprehensive guide to all issues related to intranets and their management.
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web technologies and the distributed information processing technologies connected with them that are based on mobile programs are described, as are the network technologies that influence security. Also covered are the methods of attacking computer networks and practical guidelines for protecting a virtual network.
Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, the new security architecture SESAME, which builds on the Kerberos authentication system, adding to it both public-key technology and a role-based access control service. Other technologies are also included such as a description of how to program with the GSS-API, and modern security technologies such as PGP, S/MIME, SSH, SSL IPSEC and CDSA. The book concludes with a comparison of the technologies. This book is different from other network s...
Written in a non-technical style, this book takes the reader through the entire process, step-by-step, from construction to administration of an NT Intranet. Each topic includes technical sidebars.
Intranets are the fastest growing segment of the World Wide Web. Before you make a move, make sure you know and understand all of the issues involved in designing, building and administering an intranet by reading this book.
In the last 12 years we have observed amazing growth of electronic communication. From typical local networks through countrywide systems and business-based distributed processing, we have witnessed widespread implementation of computer-controlled transmissions encompassing almost every aspect of our business and private lives.Internet and Intranet Security, Management, Risks and Solutions addresses issues of information security from the managerial, global point of view. The global approach allows us to concentrate on issues that could be influenced by activities happening on opposite sides of the globe.
This book looks at the basics of computer networks. It describes what networks are and how they work, the different kinds of network, and the difference between the Internet and the World Wide Web. It explains how to contact people online using email and social networks, shows how networks can be used to work with other people online, and touches on creating websites and blogs. The topics covered are illustrated with do's and don'ts, Did You Know? boxes and current developments in the world of computing.
An intranet can be a powerful tool. A well-designed intranet becomes the key resource and communications platform for your organization, used by members of staff as their first destination for information. In contrast, a poorly designed intranet will sit unused, accumulating useless information, and eating up IT budgets. So, how do you avoid this situation, and make sure you design the most useful, and usable, intranet? This book takes you through the steps you need to take to make an invaluable intranet, from identifying your users' needs and building an indispensable tool, to marketing the results. It guides you through the problems that may occur, passing on invaluable advice from people ...