25 Books to Read Before You Die
 
 

Recently Viewed clear list


The Powell's Playlist | August 8, 2014

Peter Mendelsund: IMG The Powell's Playlist: Water Music by Peter Mendelsund



We "see" when we read, and we "see" when we listen. There are many ways in which music can create the cross-sensory experience of this seeing...... Continue »
  1. $11.87 Sale Trade Paper add to wish list

spacer
Qualifying orders ship free.
$18.75
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
1 Remote Warehouse Networking- Computer Security

Kerberos: A Network Authentication System (Addison-Wesley Networking Basics Series)

by

Kerberos: A Network Authentication System (Addison-Wesley Networking Basics Series) Cover

 

Synopses & Reviews

Publisher Comments:

This handbook is a complete step-by-step guide to working with Kerberos, one of the most popular network authentication systems used by network administrators and programmers. Kerberos provides a clear explanation of network security principles and basic concepts, while taking you through each element of the Kerberos system.

Written by a network security professional who has worked with Kerberos extensively, this practical guide reveals the experience-based tips that will help you avoid pitfalls and maximize the system's capabilities. The text shows you how to obtain, install, optimize, use, and administer Kerberos, and covers important information for developing Kerberized applications.

You will find thorough explanations of such key topics as:

  • Basic cryptography and hash functions
  • Mutual authentication
  • Establishing and changing passwords
  • Manipulating credentials
  • Installing the Key Distribution Center (KDC)
  • Optimizing configuration
  • Creating and administering a Kerberos database
  • Adding, deleting, and modifying a principal
  • Setting up cross-realm authentication
  • Extensible function calls
  • The GSS-API
  • The various versions of Kerberos and their operational differences

In addition to these topics, Kerberos also discusses the effect of public key cryptography on the Kerberos protocol, its incorporation into Windows NT 5.0, and its use with smart cards and PC cards.

With this book in hand, the security, flexibility, and convenience of Kerberos is brought within easy reach of today's time-constrained administrator.

0201379244B04062001

Book News Annotation:

A step-by-step guide to working with Kerberos, a popular network authentication system used by network administrators and programmers. Provides a clear explanation of network security principles and basic concepts, and walks through each element of the Kerberos system. Shows how to obtain, install, optimize, use, and administer Kerberos, and gives information on developing Kerberized applications. Tung is a computer scientist at the University of Southern California's Information Sciences Institute.
Annotation c. Book News, Inc., Portland, OR (booknews.com)

Synopsis:

Kerberos authentication offers a proven, non-proprietary solution for maximizing the security of virtually any computing system without compromising performance. This is the first authoritative, accessible guide to Kerberos for both users and administrators. Authored by Brian Tung, who wrote the Internet's #1 Kerberos web site, this book brings together everything you need to understand, deploy, use, and manage Kerberos servers. Tung presents a remarkably clear explanation of Kerberos components, algorithms, and protocols, plus a full chapter on developing Kerberized applications. Finally, preview the exciting future of Kerberos, including integration with public-key cryptography, smart cards, and Windows 2000.

Synopsis:

This handbook is a complete step-by-step guide to working with Kerberos, one of the most popular network authentication systems used by network administrators and programmers. Kerberos provides a clear explanation of network security principles and basic concepts, while taking you through each element of the Kerberos system. Written by a network security professional who has worked with Kerberos extensively, this practical guide reveals the experience-based tips that will help you avoid pitfalls and maximize the system's capabilities. The text shows you how to obtain, install, optimize, use, and administer Kerberos, and covers important information for developing Kerberized applications. You will find thorough explanations of such key topics as: x Basic cryptography and hash functions x Mutual authentication x Establishing and changing passwords x Manipulating credentials x Installing the Key Distribution Center (KDC) x Optimizing configuration x Creating and administering a Kerberos database x Adding, deleting, and modifying a principal x Setting up cross-realm authentication x Extensible function calls x The GSS-API x The various versions of Kerberos and their operational differences In addition to these topics, Kerberos also discusses the effect of public key cryptography on the Kerberos protocol, its incorporation into Windows NT 5.0, and its use with smart cards and PC cards. With this book in hand, the security, flexibility, and convenience of Kerberos is brought within easy reach of today's time-constrained administrator.

Description:

Includes bibliographical references (p. 155-159) and index.

About the Author

Brian Tung is a computer scientist at the University of Southern California's Information Sciences Institute, where he is currently designing and implementing public key extensions to Kerberos. An acknowledged Kerberos expert, Mr. Tung is the author and keeper of the much-respected and often-visited Kerberos Web page The Moron's Guide to Kerberos.

0201379244AB04062001

Table of Contents

Preface xi.

1. Overview: A Kerberos FAQ.

What Is Kerberos?

What Is Kerberos Good For?

What Versions Are Available?

Where Can I Get Kerberos?

What On-Line Information Is There?

How Is Kerberos Used for Security?

2. Kerberos for Users.

Using Kerberos.

Manipulating Credentials.

Changing Your Kerberos Password.

Performing Basic Kerberos Operations.

Using MIT-Kerberized Applications.

Encrypting Your Session.

Forwarding Tickets.

Specifying the User.

Knowing When Something Isn't Right.

Using the Windows 95/NT Interface.

Using Eudora.

3. Kerberos for Administrators.

Knowing What You're Trying to Protect.

Building the Kerberos Distribution.

Installing the KDC.

The krb5.conf Configuration File.

The kdc.conf Configuration File.

Creating the Kerberos Database.

Setting Up the Administrative Principals.

Starting the KDC and the Admin Server.

Accessing the Database.

Adding a New Principal.

Deleting a Principal.

Modifying a Principal.

Changing a Password.

Retrieving a Principal's Database Entry.

Listing the Database Entries.

Compiling a Keytab File.

Removing Principals from a Keytab File.

Finding Out What Commands Are Available.

Quitting.

Setting Up Cross-Realm Authentication.

Administering an Application Server.

4. Kerberos for Developers.

Contents of a Kerberized Application.

Example of a Kerberized Application.

The Client.

The Server.

Extensible Function Calls.

Error Handling.

Replay Caches.

A Password-Changing Program.

Other Kerberos API Calls.

GSS-API.

Understanding How the GSS-API Calls Work.

Taking Advantage of GSS-API.

5. The Basics of Kerberos.

The Origins of Kerberos.

Principals.

A Primer on Cryptography.

Ciphers.

One-Way Hashes.

Authentication with Kerberos.

The (High-Level) Details.

Mutual Authentication.

KDC = AS + TGS.

Cross-Realm Authentication.

The Kerberos Environment.

A Note about Passwords.

Local Security.

6. Other Versions of Kerberos.

Pre-V5 and Commercial Versions.

Kerberos V1, V2, V3.

Kerberos V4.

Bones, E-Bones, and Heimdal.

TrustBroker.

V4 and V5 Operational Differences.

kinit.

klist.

kdestroy.

V4 and V5 Anatomical Differences.

Byte Ordering.

Ticket Lifetimes.

Delegation.

Password Hashing.

Preauthentication.

Cryptographic Algorithms.

7. New Directions for Kerberos.

Public Key Cryptography.

The Basics of Public Key Cryptography.

The Strength of Public Key Cryptography.

Public Key Certification.

Effect on the Kerberos Protocol.

Use in Cross-Realm Authentication.

Public Key Kerberos Today.

Kerberos and Windows 2000.

Smart Cards and Other Portable Devices.

Smart Cards and PC Cards.

PC Cards and the Kerberos Protocol.

Appendix A. Glossary.

Appendix B. Annotated Bibliography.

Books.

Papers.

Internet Specifications.

On-Line References.

Index. 0201379244T04062001

Product Details

ISBN:
9780201379242
Author:
Tung, Brian
Publisher:
Addison-Wesley Professional
Location:
Reading, Mass. :
Subject:
Networking - General
Subject:
Computer networks
Subject:
Security
Subject:
Security measures
Subject:
Computer networks -- Access control.
Subject:
Security - General
Subject:
Computer networks -- Security measures.
Subject:
Internet - Security
Subject:
Networking-Computer Security
Copyright:
Edition Number:
1st
Edition Description:
Trade paper
Series:
The Addison-Wesley Networking Basics Series
Binding:
TRADE PAPER
Grade Level:
Professional and scholarly
Language:
English
Illustrations:
Yes
Pages:
192
Dimensions:
8.3 x 5.5 x 0.6 in 181 gr

Other books you might like

  1. Mastering Network Security 2e... Used Trade Paper $25.00
  2. Applied Cryptography 2ND Edition Used Trade Paper $29.00
  3. Kerberos: The Definitive Guide New Trade Paper $39.99
  4. Network Security Private Communicati... Used Hardcover $68.00
  5. Network Intrusion Detection 3RD Edition New Trade Paper $49.50
  6. Third Chimpanzee the Evolution &... Used Trade Paper $6.50

Related Subjects

Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General

Kerberos: A Network Authentication System (Addison-Wesley Networking Basics Series) New Trade Paper
0 stars - 0 reviews
$18.75 In Stock
Product details 192 pages Addison-Wesley Professional - English 9780201379242 Reviews:
"Synopsis" by , Kerberos authentication offers a proven, non-proprietary solution for maximizing the security of virtually any computing system without compromising performance. This is the first authoritative, accessible guide to Kerberos for both users and administrators. Authored by Brian Tung, who wrote the Internet's #1 Kerberos web site, this book brings together everything you need to understand, deploy, use, and manage Kerberos servers. Tung presents a remarkably clear explanation of Kerberos components, algorithms, and protocols, plus a full chapter on developing Kerberized applications. Finally, preview the exciting future of Kerberos, including integration with public-key cryptography, smart cards, and Windows 2000.
"Synopsis" by , This handbook is a complete step-by-step guide to working with Kerberos, one of the most popular network authentication systems used by network administrators and programmers. Kerberos provides a clear explanation of network security principles and basic concepts, while taking you through each element of the Kerberos system. Written by a network security professional who has worked with Kerberos extensively, this practical guide reveals the experience-based tips that will help you avoid pitfalls and maximize the system's capabilities. The text shows you how to obtain, install, optimize, use, and administer Kerberos, and covers important information for developing Kerberized applications. You will find thorough explanations of such key topics as: x Basic cryptography and hash functions x Mutual authentication x Establishing and changing passwords x Manipulating credentials x Installing the Key Distribution Center (KDC) x Optimizing configuration x Creating and administering a Kerberos database x Adding, deleting, and modifying a principal x Setting up cross-realm authentication x Extensible function calls x The GSS-API x The various versions of Kerberos and their operational differences In addition to these topics, Kerberos also discusses the effect of public key cryptography on the Kerberos protocol, its incorporation into Windows NT 5.0, and its use with smart cards and PC cards. With this book in hand, the security, flexibility, and convenience of Kerberos is brought within easy reach of today's time-constrained administrator.
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.