
Enterprise Directory and Security Implementation Guide
Designing and Implementing Directories in Your Organization
- 1st Edition - August 5, 2002
- Imprint: Academic Press
- Authors: Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper
- Language: English
- Paperback ISBN:9 7 8 - 0 - 1 2 - 1 6 0 4 5 2 - 3
- eBook ISBN:9 7 8 - 0 - 0 8 - 0 4 9 1 2 6 - 4
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quote1.1 Directories
1.2 X.500 and LDAP
Chapter 2—Directories, Security, and Tigers—Oh, My!
2.1 Directory Types
2.2 Directory Uses
2.3 Directory Security
Chapter 3—Directory Architecture
3.1 Architecture Defined
3.2 Critical Elements
3.3 Implementations—Products and Vendors
3.4 DAP and LDAP
References
Chapter 4—More on LDAP
4.1 Referrals
4.2 Authentication and Authorization
4.3 X.500
4.4 X.509
4.5 LDIF
Chapter 5—Directories Within the Enterprise
5.1 Historical Perspective
5.2 Directories and Privacy
5.3 Directories and NOS/OS
5.4 Directories and Messaging
Chapter 6—Implementation Considerations
for the Enterprise Directory
6.1 Directory Content, Design, DIT, and Attributes
6.2 Authoritative Sources of the Directory Information
6.3 Uniqueness Criteria
6.4 Directory Aggregation
Chapter 7—Enterprise Security
7.1 Bolt-on Security
7.2 Process Security
7.3 Competitive Asset
7.4 Physical Security Policy
7.5 Network Security Policy
7.6 Acceptable Use Policy
Chapter 8—The Security Strategy
8.1 The Security Committee
8.2 The Corporate Security Policy Document
Chapter 9—PKCS, PKIX, and LDAP
9.1 The Public-Private Key
9.2 The CRL
9.3 The LDAP
9.4 Public-Key Cryptography Standards
9.5 Cylink
9.6 Certification Practice Statement
Chapter 10—Enterprise Security Scenarios
10.1 Filtered Directory
10.2 The 100 Percent LDAP Solution
Chapter 11—Enterprise Security
and Security Deployment Planning
11.1 Security Planning
11.2 Security Hardware and Software Reference Guide
- Edition: 1
- Published: August 5, 2002
- No. of pages (eBook): 272
- Imprint: Academic Press
- Language: English
- Paperback ISBN: 9780121604523
- eBook ISBN: 9780080491264
TS
Tim Speed
He and Juanita Ellis are the co-authors of books on Internet security and e-business.
JE
Juanita Ellis
Currently, she works with companies in helping deploy voice and data networks, converged solutions, VPN security and call center applications. In addition, she was a technical manager at Lotus/IBM for the southern, mid-Atlantic, and eastern regions of the United States. As a technical manager, she was responsible for designing and architecting enterprise-wide applications that integrated with enterprise resource planning systems, Internet technologies, and relational and transaction-based systems. She is currently an independent consultant.
SK