Record ID | marc_columbia/Columbia-extract-20221130-004.mrc:384747643:3283 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-004.mrc:384747643:3283?format=raw |
LEADER: 03283mam a2200385 a 4500
001 1794061
005 20220608235528.0
008 950927t19951995caua 001 0 eng d
010 $a 96136381
020 $a1565921348
035 $a(OCoLC)ocm33212249
035 $9ALM3023CU
035 $a(NNC)1794061
035 $a1794061
040 $aDBS$cDLC$dOrLoB-B
042 $alccopycat
050 04 $aQA76.9.D5$bH8 1995
082 00 $a005.8$220
100 0 $aHuwei.$0http://id.loc.gov/authorities/names/nr96016018
245 10 $aDCE security programming /$cWei Hu.
260 $aSebastopol, CA :$bO'Reilly & Associates,$c[1995], ©1995.
300 $axix, 364 pages :$billustrations ;$c23 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
500 $a"OSF Distributed Computing Environment"--Cover.
500 $aIncludes index.
505 00 $gCh. 1.$tSecurity and the Distributed Computing Environment --$gCh. 2.$tWhat Does a DCE Security Server Do? --$gCh. 3.$tOverview of the DCE Security Application Programming Interface --$gCh. 4.$tHow to Write an Application That Uses Security --$gCh. 5.$tA Programmer's View of Access Control Lists --$gCh. 6.$tWriting an Application That Uses ACLs --$gCh. 7.$tWriting the Remote ACL Management Interface --$gCh. 8.$tDCE 1.1 Security Enhancements --$tAppendix A: Unauthenticated Version of the Employee Database Application --$tAppendix B: Employee Database Application: Authorization by Name --$tAppendix C: Employee Database Application: PAC-based Authorization --$tAppendix D: Employee Database Application: ACL-based Authorization.
520 $aCurious hospital staff peeking at medical records of famous people. Snoopers grabbing passwords and tunneling through a private network. Practical jokers changing documents under their authors' noses. Network security affects all of us. Here lies one of the greatest strengths of the Distributed Computing Environment (DCE) from the Open Software Foundation (OSF). DCE offers the most complete, flexible, and well-integrated network security package in the industry.
520 8 $aThe heart of DCE Security lies in access control lists (ACLs). But before you start to play with these, you have to do some design work. For instance, ACLs need to be stored on disk so that they can last between runs of the application.
520 8 $aThis book helps you plan your application and lay the groundwork for ACLs, as well as use the calls that come with the DCE Security interfaces. It covers the purpose of DCE Security, how the whole system fits together, what is required of the programmer, and how to figure out what needs protection.
520 8 $aUsing a sample application, increasingly sophisticated types of security are discussed: authenticating and authorizing the client and server; using ACLs for authorization; and the notorious, dreaded ACL manager. This book focuses on version 1.0 of DCE. However, issues in version 1.1 are also discussed so that you can migrate to that interface.
650 0 $aElectronic data processing$xDistributed processing$xSecurity measures.
650 0 $aComputer security.$0http://id.loc.gov/authorities/subjects/sh90001862
740 02 $aOSF Distributed Computing Environment.
852 00 $boff,eng$hQA76.9.D5$iH8 1995