Advertisement

Configuring Enterprise Security

  • Michael Wessler
  • Erin Mulder
  • Rob Harrop
  • Jan Machacek

Abstract

Computer security is one issue that routinely makes the news and keeps administrators busy. Particularly when managing web servers, security needs to be a constant theme because of the increased vulnerability of systems connected to the Internet. Failure to properly secure your system will, sooner or later (probably sooner), result in someone getting into it. If you’re “lucky,” the hacker will just snoop around. If the hacker is criminal or malicious, he can steal your data, rob your company and customers, use your system as a launching pad for attacking other systems, and ultimately corrupt or destroy your system.

Keywords

Identity Management Configuration File Certificate Authority Secure Socket Layer Oracle Database 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Michael Wessler, Erin Mulder, Rob Harrop, and Jan Machacek 2004

Authors and Affiliations

  • Michael Wessler
  • Erin Mulder
  • Rob Harrop
  • Jan Machacek

There are no affiliations available

Personalised recommendations