Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Kerberos: A Network Authentication System by Tung, Brian
by Tung, Brian | PB | Good
US $7.53
Approximately£5.56
Condition:
“Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, ”... Read moreAbout condition
Good
A book that has been read, but is in good condition. Minimal damage to the book cover eg. scuff marks, but no holes or tears. If this is a hard cover, the dust jacket may be missing. Binding has minimal wear. The majority of pages are undamaged with some creasing or tearing, and pencil underlining of text, but this is minimal. No highlighting of text, no writing in the margins, and no missing pages. See the seller’s listing for full details and description of any imperfections.
2 available
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
Free Economy Shipping.
Estimated between Sat, 26 Jul and Wed, 30 Jul to 94104
Located in: Aurora, Illinois, United States
Returns:
30 days return. Seller pays for return postage.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:146386205243
Item specifics
- Condition
- Good
- Seller notes
- Binding
- Paperback
- Book Title
- Kerberos
- Weight
- 0 lbs
- Product Group
- Book
- IsTextBook
- No
- ISBN
- 9780201379242
About this product
Product Identifiers
Publisher
Addison Wesley Professional
ISBN-10
0201379244
ISBN-13
9780201379242
eBay Product ID (ePID)
560767
Product Key Features
Number of Pages
192 Pages
Language
English
Publication Name
Kerberos : a Network Authentication System
Publication Year
1999
Subject
Networking / Vendor Specific, Networking / General, Security / Networking
Type
Textbook
Subject Area
Computers
Series
The Addison-Wesley Networking Basics Ser.
Format
Trade Paperback
Dimensions
Item Height
0.5 in
Item Weight
6.4 Oz
Item Length
8.2 in
Item Width
5.5 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
99-020766
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Preface xi. 1. Overview: A Kerberos FAQ. What Is Kerberos?What Is Kerberos Good For?What Versions Are Available?Where Can I Get Kerberos?What On-Line Information Is There?How Is Kerberos Used for Security? 2. Kerberos for Users. Using Kerberos.Manipulating Credentials.Changing Your Kerberos Password.Performing Basic Kerberos Operations.Using MIT-Kerberized Applications.Encrypting Your Session.Forwarding Tickets.Specifying the User.Knowing When Something Isn't Right.Using the Windows 95/NT Interface.Using Eudora. 3. Kerberos for Administrators. Knowing What You're Trying to Protect.Building the Kerberos Distribution.Installing the KDC.The krb5.conf Configuration File.The kdc.conf Configuration File.Creating the Kerberos Database.Setting Up the Administrative Principals.Starting the KDC and the Admin Server.Accessing the Database.Adding a New Principal.Deleting a Principal.Modifying a Principal.Changing a Password.Retrieving a Principal's Database Entry.Listing the Database Entries.Compiling a Keytab File.Removing Principals from a Keytab File.Finding Out What Commands Are Available.Quitting.Setting Up Cross-Realm Authentication.Administering an Application Server. 4. Kerberos for Developers. Contents of a Kerberized Application.Example of a Kerberized Application.The Client.The Server.Extensible Function Calls.Error Handling.Replay Caches.A Password-Changing Program.Other Kerberos API Calls.GSS-API.Understanding How the GSS-API Calls Work.Taking Advantage of GSS-API. 5. The Basics of Kerberos. The Origins of Kerberos.Principals.A Primer on Cryptography.Ciphers.One-Way Hashes.Authentication with Kerberos.The (High-Level) Details.Mutual Authentication.KDC = AS + TGS.Cross-Realm Authentication.The Kerberos Environment.A Note about Passwords.Local Security. 6. Other Versions of Kerberos. Pre-V5 and Commercial Versions.Kerberos V1, V2, V3.Kerberos V4.Bones, E-Bones, and Heimdal.TrustBroker.V4 and V5 Operational Differences.kinit.klist.kdestroy.V4 and V5 Anatomical Differences.Byte Ordering.Ticket Lifetimes.Delegation.Password Hashing.Preauthentication.Cryptographic Algorithms. 7. New Directions for Kerberos. Public Key Cryptography.The Basics of Public Key Cryptography.The Strength of Public Key Cryptography.Public Key Certification.Effect on the Kerberos Protocol.Use in Cross-Realm Authentication.Public Key Kerberos Today.Kerberos and Windows 2000.Smart Cards and Other Portable Devices.Smart Cards and PC Cards.PC Cards and the Kerberos Protocol. Appendix A. Glossary. Appendix B. Annotated Bibliography. Books.Papers.Internet Specifications.On-Line References. Index. 0201379244T04062001
Synopsis
This handbook is a complete step-by-step guide to working with Kerberos, one of the most popular network authentication systems used by network administrators and programmers. Kerberos provides a clear explanation of network security principles and basic concepts, while taking you through each element of the Kerberos system. Written by a network security professional who has worked with Kerberos extensively, this practical guide reveals the experience-based tips that will help you avoid pitfalls and maximize the systems capabilities. The text shows you how to obtain, install, optimize, use, and administer Kerberos, and covers important information for developing Kerberized applications. You will find thorough explanations of such key topics as: *Basic cryptography and hash functions *Mutual authentication *Establishing and changing passwords *Manipulating credentials *Installing the Key Distribution Center (KDC) *Optimizing configuration *Creating and administering a Kerberos database *Adding, deleting, and modifying a principal *Setting up cross-realm authentication *Extensible function calls *The GSS-API *The various versions of Kerberos and their operational differences In addit, Kerberos authentication offers a proven, non-proprietary solution for maximizing the security of virtually any computing system without compromising performance. This is the first authoritative, accessible guide to Kerberos for both users and administrators. Authored by Brian Tung, who wrote the Internet's #1 Kerberos web site, this book brings together everything you need to understand, deploy, use, and manage Kerberos servers. Tung presents a remarkably clear explanation of Kerberos components, algorithms, and protocols, plus a full chapter on developing Kerberized applications. Finally, preview the exciting future of Kerberos, including integration with public-key cryptography, smart cards, and Windows 2000.
LC Classification Number
TK5105.59.T86 1999
Item description from the seller
Seller business information
About this seller
ThriftBooks
98.9% positive Feedback•19.7M items sold
Registered as a business seller
Popular categories from this shop
Seller Feedback (5,686,217)
- c***m (410)- Feedback left by buyer.Past 6 monthsVerified purchaseWOW!; I cannot believe this 3 Days to Hawaii! ; AAA+++; Excellent Service; Great Pricing; Fast Delivery-Faster Than Expected to Hawaii!; Shipped 05/05, Mon, Received 05/08, Thu to Hawaii using free shipping; USPS Ground Mail, Book in Excellent Condition--Better Than Described ; TLC Packaging; Excellent Seller Communication, Sends updates . Highly Recommended!, Thank you very much!
- a***r (375)- Feedback left by buyer.Past monthVerified purchasei am so happy to have every book of this series! the price of the book & the shipping is very reasonable! the book was as described & was in excellent condition! it was shipped quickly & arrived quickly! the books are always packaged carefully so they arrived undamaged! the communication from the sellers is always excellent--they go out of their way for excellent customer service! i have been a repeat customer from this seller & always will be! this seller is the best bookseller on ebay!
- l***b (331)- Feedback left by buyer.Past monthVerified purchase5 STARS on ALL aspects... ITEM AS DESCRIBED - 5 STARS... PACKAGING & SHIPPING - 5 STARS... VALUE OF ITEM RECEIVED - 5 STARS... COMMUNICATION - 5 STARS. Would highly recommend this seller to all Ebay buyers without any reservations. Thanks again for your business with BB812, and we do appreciate your care and consideration of our offer. HAPPY EBAY LIFE !!!
More to explore:
- Brian Herbert Fiction & Fiction Books,
- Brian Jacques Fiction & Fiction Books,
- Brian Azzarello Comics, Graphic Novels & TPBs,
- Brian Herbert Paperback Fiction & Fiction Books,
- Brian Michael Bendis Comics, Graphic Novels & TPBs,
- Brian Azzarello English Comics, Graphic Novels & TPBs,
- Networks Workbook Adult Learning & University Books,
- Non-Fiction Network Fiction & Non-Fiction Books,
- Non-Fiction Networking Fiction & Non-Fiction Books,
- Non-Fiction McGraw-Hill Network Fiction & Books