did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780596004033

Kerberos

by
  • ISBN13:

    9780596004033

  • ISBN10:

    0596004036

  • Format: Paperback
  • Copyright: 2003-09-01
  • Publisher: Oreilly & Associates Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99 Save up to $18.50
  • Digital
    $31.49
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

The Internet is a very insecure place. Many of the current protocols don't provide adequate security, leaving web applications that send unencrypted passwords over the network vulnerable to malicious hackers using password "sniffing" tools. To combat these deficiencies, researchers at MIT created an authentication protocol called Kerberos. Kerberos: The Definitive Guide provides a thorough introduction to Kerberos terminology and explores all the details of the protocol. Everything is here, from implementation to troubleshooting, including ways to add Kerberos to software packages.

Author Biography

Jason Garman is currently working with computer forensics for the national defense and intelligence communities at Aegis Research Corporation. Previously, he worked at several biotech firms in the Washington, DC area where he helped clients design and implement secure yet easy to use research networks. Jason enjoys working with the practical application of tools and techniques to solve computer and network security problems.

Table of Contents

Preface
Introduction Origins What Is Kerberos? Goals Evolution Other Products
Pieces of the Puzzle The Three As Directories Privacy and Integrity Kerberos Terminology and Concepts Putting the Pieces Together
Protocols The Needham-Schroeder Protocol Kerberos 4 Kerberos 5 The Alphabet Soup of Kerberos-Related Protocols
Implementation The Basic Steps Planning Your Installation Before You Begin KDC Installation DNS and Kerberos Client and Application Server Installation
Troubleshooting A Quick Decision Tree Debugging Tools Errors and Solutions
Security Kerberos Attacks Protocol Security Issues Security Solutions Protecting Your KDC Firewalls, NAT, and Kerberos Auditing
Applications What Does Kerberos Support Mean? Services and Keytabs Transparent Kerberos Login with PAM Mac OS X and the Login Window Kerberos and Web-Based Applications The Simple Authentication and Security Layer (SASL) Kerberos-Enabled Server Packages Kerberos-Enabled Client Packages More Kerberos-Enabled Packages
Advanced Topics Cross-Realm Authentication Using Kerberos 4 Services with Kerberos 5 Windows Issues Windows and Unix Interoperability
Case Study The Organization Planning Implementation
Kerberos Futures Public Key Extensions Smart Cards Better Encryption Kerberos Referrals Web Services
Appendix: Administration
Reference
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program