Publisher: O'Reilly, 1995, 364 pages
ISBN: 1-56592-134-8
Keywords: IT Security, Networks
Curious hospital staff peeking at medical records of famous people. Snoopers grabbing passwords and tunneling through a private network. Practical jokers changing documents under their authors' noses.
Network security affects all of us. Here lies one of the greatest strengths of the Distributed Computing Environment (DCE) from the Open Software Foundation (OSF). DCE offers the most complete, flexible, and well-integrated network security package in the industry.
The heart of DCE Security lies in access control lists (ACLs). But before you start to play with these, you have to do some design work. For instance, ACLs need to be stored on disk so that they can last between runs of the applications.
This book helps you plan your application and lay the groundwork for ACLs, as well as use the calls that come with the DCE Security interfaces. It covers the purpose of DCE Security, how the whole system fits together, what is required of the programmer, and how to figure out what needs protection. Using a sample application, increasingly sophisticated types of security are discussed:
This book focuses on version 1.0 of DCE. However, issues in version 1.1 are also discussed so that you can migrate to that interface.
Covers mostly DCE 1.0 even though 1.1 is mentioned. It's OK.
Comments
There are currently no comments
New Comment