Logo

Guide to Securing Intranet and Extranet Servers

Small book cover: Guide to Securing Intranet and Extranet Servers

Guide to Securing Intranet and Extranet Servers

Publisher: VeriSign
Number of pages: 39

Description:
As Intranets and Extranets have become more widely deployed, new security challenges have emerged. This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use. The guide also describes how an intelligently deployed Public Key Infrastructure (PKI) system, based on digital certificate technology, addresses these security goals.

Download or read it online for free here:
Download link
(1.1MB, PDF)

Download mirrors:
Mirror 1
Mirror 2

Similar books

Book cover: Internet Safety: Keeping your Computer Safe on the InternetInternet Safety: Keeping your Computer Safe on the Internet
by - Puget Sound Software
In this free 113 page ebook I summarize popular articles from covering the basics -- the things you must do, the software you must run and the concepts you need to be aware of -- to keep your computer and your data safe as you use the internet.
(14360 views)
Book cover: Network Security ToolsNetwork Security Tools
by - O'Reilly Media, Inc.
The book shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools.
(15799 views)
Book cover: Ethical HackingEthical Hacking

Ethical hacking, which encompasses methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with the target's permission in a professional setting.
(7194 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(18382 views)