The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance.
This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with "best practices" on directory architecture, implementation, and enterprise security strategies.
"synopsis" may belong to another edition of this title.
Timothy Speed is an infrastructure and security architect for Lotus Professional Services (LPS), an IBM company. Tim has been involved in Internet and messaging security for the last 8 years. He has assisted with the Domino infrastructure at the Nagano Olympics and the Lotus Notes systems for the Sydney Olympics. Certifications include MCSE, VCA (VeriSign Certified Administrator), Lotus Domino CLP Principal Administrator, and Lotus Domino CLP Principal Developer.
He and Juanita Ellis are the co-authors of books on Internet security and e-business.
Juanita Ellis has been at the forefront in working with corporations in the areas of convergence, computer Security and e-business. Some of these companies include Sony, JCPenney, SWBell, Boeing, Xerox, Bell Atlantic, MCI, Citibank and Toyota.
Currently, she works with companies in helping deploy voice and data networks, converged solutions, VPN security and call center applications. In addition, she was a technical manager at Lotus/IBM for the southern, mid-Atlantic, and eastern regions of the United States. As a technical manager, she was responsible for designing and architecting enterprise-wide applications that integrated with enterprise resource planning systems, Internet technologies, and relational and transaction-based systems. She is currently an independent consultant.
Steffano Korper and Juanita Ellis are experts in cutting edge technologies, both as university lecturers and industry leaders. Lectures and programs have been conducted at the University of Maryland, University of Texas, Southern Methodist University, and University of California, Los Angeles. Nationally recognized corporations and organizations have requested their expertise in developing and deploying e-commerce solutions in both business-to-business and business-to-consumer commerce. In 1998, they developed the E-Commerce Program. Program details may be found at http://www.going-beyond-et.com. They have been featured on local and national radio shows, including CNN, Daybreak USA, Computer Daze, and Business Day. They also have been interviewed by publications such as Entrepreneur Magazine.Steffano Korper holds a B.S. in Business and Management and an M.S. in Information Systems.Juanita Ellis holds a B.S. in Business and Management and an M.S. in Information Systems. Currently, she is working on a Doctorate in Electrical Engineering Communications at George Washington University.Korper and Ellis continue to rise in visibility in the world of E-Commerce. Their courses have expanded from Southern Methodist University and University of California, Los Angeles to dozens of short courses at major corporations, including Motorola and Sony.
"About this title" may belong to another edition of this title.
Shipping:
US$ 13.65
From United Kingdom to U.S.A.
Seller: Phatpocket Limited, Waltham Abbey, HERTS, United Kingdom
Condition: Like New. Used - Like New. Book is new and unread but may have minor shelf wear. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Seller Inventory # Z1-T-023-00955
Quantity: 1 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 268. Seller Inventory # 263673878
Quantity: 1 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 268 Illus. Seller Inventory # 5222601
Quantity: 1 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. pp. 268. Seller Inventory # 183673884
Quantity: 1 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9780121604523
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 497. Seller Inventory # C9780121604523
Quantity: Over 20 available
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: New. Über den AutorTimothy Speed is an infrastructure and security architect for Lotus Professional Services (LPS), an IBM company. Tim has been involved in Internet and messaging security for the last 8 years. He has assisted with the D. Seller Inventory # 594355987
Quantity: Over 20 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Neuware - The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential 'hackers.' If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance.This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with 'best practices' on directory architecture, implementation, and enterprise security strategies. Seller Inventory # 9780121604523
Quantity: 2 available