Guide to Securing Intranet and Extranet Servers
Publisher: VeriSign 2000
Number of pages: 39
Description:
As Intranets and Extranets have become more widely deployed, new security challenges have emerged. This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use. The guide also describes how an intelligently deployed Public Key Infrastructure (PKI) system, based on digital certificate technology, addresses these security goals.
Download or read it online for free here:
Download link
(1.1MB, PDF)
Similar books
Intrusion Detection with SNORT
by Rafeeq Ur Rehman - Prentice Hall PTR
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
(16220 views)
by Rafeeq Ur Rehman - Prentice Hall PTR
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
(16220 views)
Improving Web Application Security: Threats and Countermeasures
by Microsoft Corporation - Microsoft Press
This guide gives you a foundation for designing, and configuring secure ASP.NET Web applications. Whether you have existing applications or are building new ones, you can apply the guidance to help you make your Web applications hack-resilient.
(17529 views)
by Microsoft Corporation - Microsoft Press
This guide gives you a foundation for designing, and configuring secure ASP.NET Web applications. Whether you have existing applications or are building new ones, you can apply the guidance to help you make your Web applications hack-resilient.
(17529 views)
Firewalls Complete
by Marcus Goncalves - Mcgraw-Hill
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.
(13214 views)
by Marcus Goncalves - Mcgraw-Hill
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.
(13214 views)
Information Security and Privacy in Network Environments
- U.S. Government Printing Office
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.
(9515 views)
- U.S. Government Printing Office
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.
(9515 views)