The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential qhackers.q If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with qbest practicesq on directory architecture, implementation, and enterprise security strategies.So they used that information along with nonunique names and unique phone numbers to publish a directory that would allow anyone ... Multiuser systems ( mainframes at that time) allowed various users to perform different functions on the computer at the same time using terminals. ... Now many of us have cellular or wireless telephones, and there are no published directories of mobile phone numbers.
|Title||:||Enterprise Directory and Security Implementation Guide|
|Author||:||Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper|
|Publisher||:||Academic Press - 2002-09-08|