Advertisement

Practical Intranet Security

Overview of the State of the Art and Available Technologies

  • Paul Ashley
  • Mark Vandenwauver

Table of contents

  1. Front Matter
    Pages i-xxi
  2. Network Security Concepts

    1. Front Matter
      Pages 1-1
    2. Paul Ashley, Mark Vandenwauver
      Pages 3-24
    3. Paul Ashley, Mark Vandenwauver
      Pages 25-43
    4. Paul Ashley, Mark Vandenwauver
      Pages 45-59
    5. Paul Ashley, Mark Vandenwauver
      Pages 61-75
  3. Kerberos and SESAME

    1. Front Matter
      Pages 77-77
    2. Paul Ashley, Mark Vandenwauver
      Pages 79-94
    3. Paul Ashley, Mark Vandenwauver
      Pages 95-126
    4. Paul Ashley, Mark Vandenwauver
      Pages 127-155
  4. Other Security Solutions

    1. Front Matter
      Pages 157-157
    2. Paul Ashley, Mark Vandenwauver
      Pages 159-182
    3. Paul Ashley, Mark Vandenwauver
      Pages 183-205
    4. Paul Ashley, Mark Vandenwauver
      Pages 207-214
  5. Back Matter
    Pages 215-244

About this book

Introduction

Foreword by Lars Knudsen
Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, the new security architecture SESAME, which builds on the Kerberos authentication system, adding to it both public-key technology and a role-based access control service. Other technologies are also included such as a description of how to program with the GSS-API, and modern security technologies such as PGP, S/MIME, SSH, SSL IPSEC and CDSA. The book concludes with a comparison of the technologies.
This book is different from other network security books in that its aim is to identify how to secure an organization's intranet. Previously books have concentrated on the Internet, often neglecting issues relating to securing intranets. However the potential risk to business and the ease by which intranets can be violated is often far greater than via the Internet.
The aim is that network administrators and managers can get the information that they require to make informed choices on strategy and solutions for securing their own intranets.
The book is an invaluable reference for network managers and network administrators whose responsibility it is to ensure the security of an organization's intranet. The book also contains background reading on networking, network security and cryptography which makes it an excellent research reference and undergraduate/postgraduate text book. 

Keywords

Internet Intranet access control architecture architectures authentication computer network control cryptography information management network security organization security technology

Authors and affiliations

  • Paul Ashley
    • 1
  • Mark Vandenwauver
    • 2
  1. 1.Queensland University of TechnologyBrisbaneAustralia
  2. 2.K.U. LeuvenBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-1-4615-5609-1
  • Copyright Information Kluwer Academic Publishers, Boston 1999
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4613-7566-1
  • Online ISBN 978-1-4615-5609-1
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering