$27.49 sale price when purchased online
$49.99 list price
Target Online store #3991
About this item
Highlights
- Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name.
- About the Author: Jason Garman is currently working with computer forensics for the national defense and intelligence communities at Aegis Research Corporation.
- 270 Pages
- Computers + Internet, Networking
Description
Book Synopsis
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary. Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need. Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting. In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations. If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.About the Author
Jason Garman is currently working with computer forensics for the national defense and intelligence communities at Aegis Research Corporation. Previously, he worked at several biotech firms in the Washington, DC area where he helped clients design and implement secure yet easy to use research networks. Jason enjoys working with the practical application of tools and techniques to solve computer and network security problems.
Dimensions (Overall): 9.3 Inches (H) x 7.52 Inches (W) x .57 Inches (D)
Weight: 1.07 Pounds
Suggested Age: 22 Years and Up
Sub-Genre: Networking
Genre: Computers + Internet
Number of Pages: 270
Publisher: O'Reilly Media
Theme: General
Format: Paperback
Author: Jason Garman
Language: English
Street Date: September 30, 2003
TCIN: 85124211
UPC: 9780596004033
Item Number (DPCI): 247-54-5931
Origin: Made in the USA or Imported
If the item details above aren’t accurate or complete, we want to know about it.
Shipping details
Estimated ship dimensions: 0.57 inches length x 7.52 inches width x 9.3 inches height
Estimated ship weight: 1.07 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO
Return details
This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, shipped, delivered by a Shipt shopper, or made ready for pickup.
See the return policy for complete information.