
Average Reviews:

(More customer reviews)This author does a good job of explaining and including the latest IT security applications & tools involved with the new concept & efficient network system of Distributing Computing; while pointing out that this new technology has a lot of weaknesses as far as vulnerability to outside attacks or other abuse etc. He also gives a lot of examples & information on how to best implement security measures to protect this type of network design & still allow an organization to take advantage of its benefits, but in a safer way that protects vital data & information.
Click Here to see more reviews about: Security In Distributed Computing: Did You Lock the Door
An end-to-end guide to safeguarding a company's information assets.Identifies key issues in computer security, and the technologies that can help organizations respond. Presents guidance on developing a distributed systems architecture and methodology that is inherently more secure. Shows how to secure distributed transaction processing systems. Covers the human and organizational aspects of security. Discusses security issues that affect PCs, workstations and mainframes, with especially detailed coverage of UNIX security issues.Anyone responsible for architecting, building, managing or auditing distributed computing applications, including software developers, project managers, system and network administrators, and security officers.
Click here for more information about Security In Distributed Computing: Did You Lock the Door