Enterprise Directory and Security Implementation Guide: D... and over one million other books are available for Amazon Kindle. Learn more
CDN$ 85.92
  • List Price: CDN$ 101.55
  • You Save: CDN$ 15.63 (15%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca.
Gift-wrap available.
Quantity:1
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization Paperback – Aug 5 2002


See all 3 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
CDN$ 85.92
CDN$ 52.92 CDN$ 32.59

2014 Books Gift Guide for Children & Teens
Browse our featured books to find gift ideas for the boys or girls on your holiday shopping list this year!


Product Details

  • Paperback: 272 pages
  • Publisher: Academic Press; 1 edition (Aug. 5 2002)
  • Language: English
  • ISBN-10: 0121604527
  • ISBN-13: 978-0121604523
  • Product Dimensions: 19 x 1.6 x 23.7 cm
  • Shipping Weight: 467 g
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: #3,258,124 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

About the Author

Timothy Speed is an infrastructure and security architect for Lotus Professional Services (LPS), an IBM company. Tim has been involved in Internet and messaging security for the last 8 years. He has assisted with the Domino infrastructure at the Nagano Olympics and the Lotus Notes systems for the Sydney Olympics. Certifications include MCSE, VCA (VeriSign Certified Administrator), Lotus Domino CLP Principal Administrator, and Lotus Domino CLP Principal Developer.

He and Juanita Ellis are the co-authors of books on Internet security and e-business.

Juanita Ellis has been at the forefront in working with corporations in the areas of convergence, computer Security and e-business. Some of these companies include Sony, JCPenney, SWBell, Boeing, Xerox, Bell Atlantic, MCI, Citibank and Toyota.

Currently, she works with companies in helping deploy voice and data networks, converged solutions, VPN security and call center applications. In addition, she was a technical manager at Lotus/IBM for the southern, mid-Atlantic, and eastern regions of the United States. As a technical manager, she was responsible for designing and architecting enterprise-wide applications that integrated with enterprise resource planning systems, Internet technologies, and relational and transaction-based systems. She is currently an independent consultant.

Steffano Korper and Juanita Ellis are experts in cutting edge technologies, both as university lecturers and industry leaders. Lectures and programs have been conducted at the University of Maryland, University of Texas, Southern Methodist University, and University of California, Los Angeles. Nationally recognized corporations and organizations have requested their expertise in developing and deploying e-commerce solutions in both business-to-business and business-to-consumer commerce. In 1998, they developed the E-Commerce Program. Program details may be found at http://www.going-beyond-et.com. They have been featured on local and national radio shows, including CNN, Daybreak USA, Computer Daze, and Business Day. They also have been interviewed by publications such as Entrepreneur Magazine.Steffano Korper holds a B.S. in Business and Management and an M.S. in Information Systems.Juanita Ellis holds a B.S. in Business and Management and an M.S. in Information Systems. Currently, she is working on a Doctorate in Electrical Engineering Communications at George Washington University.Korper and Ellis continue to rise in visibility in the world of E-Commerce. Their courses have expanded from Southern Methodist University and University of California, Los Angeles to dozens of short courses at major corporations, including Motorola and Sony.

Inside This Book (Learn More)
First Sentence
We all use some type of a directory. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

5.0 out of 5 stars
5 star
1
4 star
0
3 star
0
2 star
0
1 star
0
See the customer review
Share your thoughts with other customers

Most helpful customer reviews

By A Customer on Jan. 12 2003
Format: Paperback
Finally a good book that shows examples of authentication via LDAP. This has been an area of great confusion. The Enterprise Security Scenarios were helpful also.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 1 review
2 of 2 people found the following review helpful
LDAP and authentication. Jan. 12 2003
By A Customer - Published on Amazon.com
Format: Paperback
Finally a good book that shows examples of authentication via LDAP. This has been an area of great confusion. The Enterprise Security Scenarios were helpful also.


Feedback