CORBA Security: An Introduction to Safe Computing with Objects (The Addison-Wesley Object Technology Series)

CORBA Security: An Introduction to Safe Computing with Objects (The Addison-Wesley Object Technology Series)

Product ID: 0201325659 Condition: USED (All books in used condition)

Payflex: Pay in 4 interest-free payments of R531.25. Read the FAQ
R 2,125
includes Duties & VAT
Delivery: 10-20 working days
Ships from USA warehouse.
Secure Transaction
VISA Mastercard payflex ozow

Product Description

Condition - Very Good

The item shows wear from consistent use but remains in good condition. It may arrive with damaged packaging or be repackaged.

CORBA Security: An Introduction to Safe Computing with Objects (The Addison-Wesley Object Technology Series)

The CORBAsecurity specification adopted by the Object Management Group (OMG) represents a major step forward in making object technology suitable for business application development. The specification document, however, is long, detailed, and complex; it is a time-consuming task for software developers to make their way through it, and it is inaccessible to CIOs and other technical managers who need to understand object security and its impact on their organizations. CORBA Security provides a readable and less technical overview of the specification and a guide to the security of object systems. Written from a policy point of view, the book will help you decide what security policies are appropriate for your organization and evaluate the object-based security options that can help you manage those policies. For those unfamiliar with basic security and object technology concepts, clear introductions to these topics will bring you up to speed. The book also provides a list of questions you can ask your secure object system vendor-questions that will get behind the jargon and acronyms and give you the information you need to determine just how safe the product really is. Readers will get an in-depth look at each element of computer security and how the CORBAsecurity specification fulfills each of these security needs. Topics covered include identification, authentication, and privilege; access control; message protection; delegation and proxy problems; auditing; and, non-repudiation. The author also provides numerous real-world examples of how secure object systems can be used to enforce useful security policies. 0201325659B04062001

Technical Specifications

Country
USA
Brand
Addison Wesley
Manufacturer
Addison-Wesley
Binding
Paperback
EANs
9780201325652