Logo

Guide to Securing Intranet and Extranet Servers

Small book cover: Guide to Securing Intranet and Extranet Servers

Guide to Securing Intranet and Extranet Servers

Publisher: VeriSign
Number of pages: 39

Description:
As Intranets and Extranets have become more widely deployed, new security challenges have emerged. This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use. The guide also describes how an intelligently deployed Public Key Infrastructure (PKI) system, based on digital certificate technology, addresses these security goals.

Download or read it online for free here:
Download link
(1.1MB, PDF)

Download mirrors:
Mirror 1
Mirror 2

Similar books

Book cover: Intrusion Detection with SNORTIntrusion Detection with SNORT
by - Prentice Hall PTR
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
(15897 views)
Book cover: OpenSSHOpenSSH
- Wikibooks
The OpenSSH protocol suite provides secure remote access and file transfer. This book is for fellow users of OpenSSH to help them save effort and time through using OpenSSH, and especially SFTP, where it makes sense to use it.
(8283 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(18424 views)
Book cover: Ethical HackingEthical Hacking

Ethical hacking, which encompasses methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with the target's permission in a professional setting.
(7223 views)