InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.
Lightweight Directory Access Protocol (LDAP) is the standard for directory information access and is the underlying protocol for a variety of email systems, Web systems, and enterprise applications. LDAP enables central management of users, groups, devices, and other data, thereby simplifying directory management and reducing the total cost of ownership. Understanding and Deploying LDAP Directory Services, written by the creators of the protocol, is known as the LDAP bible and is the classic text for learning about LDAP and how to utilize it effectively. The Second Edition builds on this success by acting as an exhaustive resource for designing, deploying, and maintaining LDAP directory services. Topics such as implementation pitfalls, establishing and maintaining user access to information, troubleshooting, and real-world scenarios will be thoroughly explored.
InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.
From ordering and downloading to setup, configuration, encryption procedures and filing systems, readers will learn all they need to know from this title. The book begins with an overview of Netscape's place in the Internet universe and quickly moves on to the advantages of using SuiteSpot, a brief look at the other components in the Suite, and then focuses on Enterprise Server. The CD-ROM features value-added programs and sample code.
InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.
The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping our online enterprises functioning correctly and securely. Unlike other books available, this book contains a complete guide to Internet security that is accessible to both novices and computer professionals. The specific steps discussed and illustrated show the reader how to implement security from the individual process to the complete corporate enterprise. The reader will also learn about resources that can help such as the Computer Emergency Response Team (CERT), the Federal Bureau of Investigation (FBI), and even their own software vendors.
This four-part overview of electronic commerce offers a more thorough and technical view of the subject than many recent books on the subject. The book provides a balance of theories, applications, and hands-on material. Electronic Commerce is divided into four parts: Electronic Commerce Basics, Electronic Commerce Supporting Activities, Implementation and Management Issues in Electronic Commerce, and Appendix and Glossary. The book's chapters begin with introductions of leading companies with significant e-commerce expertise and at least two small case studies. They include 10 or more hands-on exercises, encouraging readers to explore and analyze sites, and a list of key terms and bibliographic citations. They conclude with 25-30 review questions and 6-10 projects for further investigation. Offers a generalist's overview of the field and its major players for people with little or no technical background Every chapter starts with an industry profile and two information boxes, which serve as case studies and point to practical applications Projects and hands-on exercises conclude each chapter
This handbook is for anyone responsible for a Web site, from the person running a personal site off a Linux PC at home up to large corporate site managers who wants to improve their performance right now.