An end-to-end guide to safeguarding a company's information assets.KEY TOPICS:Identifies key issues in computer security, and the technologies that can help organizations respond. Presents guidance on developing a distributed systems architecture and methodology that is inherently more secure. Shows how to secure distributed transaction processing systems. Covers the human and organizational aspects of security. Discusses security issues that affect PCs, workstations and mainframes, with especially detailed coverage of UNIX security issues.MARKET:Anyone responsible for architecting, building, managing or auditing distributed computing applications, including software developers, project managers, system and network administrators, and security officers.
18290-7
Practical techniques for securing distributed computing systems.
Computing security is, at its core, more than a technical issue: It's a fundamental business challenge. Managers have plenty of security alternatives, but little real guidance on making intelligent decisions about them. And today's distributed, multivendor, Internet-connected environments encompass more insecure systems and networks than ever before.
Security in Distributed Computing offers the manager of distributed systems a thorough, common-sense framework for cost-effective computer security. Learn how to:
- Develop distributed systems architectures and methodologies that are inherently more secure
- Build trusted, Open-Systems-based distributed transaction processing systems
- Evaluate cost vs. risk: What is worth securing, and at what price?
- Consider human and organizational factors, so you can enhance security with minimum disruption to people and processes.
This book reviews critical risk areas in distributed systems, including networks, operating systems, applications, middleware, and the Internet. It considers the unique challenges of security in UNIX and Windows NT environments. And it presents detailed information about technologies that can help you respond, including:
- Cryptography
- The Kerberos authentication model
- DCE security
Security in Distributed Computing also presents valuable, in-depth recommendations of how to design and implement a security strategy.
The more your organization comes to rely on distributed systems, the more important security will become. When you need to make important business decisions about security, you'll appreciate the practical advice and insight this book delivers.