Kerberos: The Definitive Guide

The Definitive Guide

Author: Jason Garman

Publisher: "O'Reilly Media, Inc."

ISBN: 9781449390778

Category: Computers

Page: 274

View: 7599

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
Release

Kerberos

The Definitive Guide

Author: Jason Garman

Publisher: "O'Reilly Media, Inc."

ISBN: 0596004036

Category: Computers

Page: 253

View: 5809

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary. Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need. Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting. In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations. If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
Release

SSH, The Secure Shell

The Definitive Guide

Author: Daniel Barrett,Richard Silverman,Robert Byrnes

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596008956

Category: Computers

Page: 645

View: 4723

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
Release

Active Directory

Designing, Deploying, and Running Active Directory

Author: Brian Desmond,Joe Richards,Robbie Allen,Alistair G. Lowe-Norris

Publisher: "O'Reilly Media, Inc."

ISBN: 1449369863

Category: Computers

Page: 738

View: 8629

Organize your network resources by learning how to design, manage, and maintain Active Directory. Updated to cover Windows Server 2012, the fifth edition of this bestselling book gives you a thorough grounding in Microsoft’s network directory service by explaining concepts in an easy-to-understand, narrative style. You’ll negotiate a maze of technologies for deploying a scalable and reliable AD infrastructure, with new chapters on management tools, searching the AD database, authentication and security protocols, and Active Directory Federation Services (ADFS). This book provides real-world scenarios that let you apply what you’ve learned—ideal whether you’re a network administrator for a small business or a multinational enterprise. Upgrade Active Directory to Windows Server 2012 Learn the fundamentals, including how AD stores objects Use the AD Administrative Center and other management tools Learn to administer AD with Windows PowerShell Search and gather AD data, using the LDAP query syntax Understand how Group Policy functions Design a new Active Directory forest Examine the Kerberos security protocol Get a detailed look at the AD replication process
Release

Using Samba

A File & Print Server for Linux, Unix & Mac OS X

Author: Gerald Carter,Jay Ts,Robert Eckstein

Publisher: "O'Reilly Media, Inc."

ISBN: 0596515359

Category: Computers

Page: 600

View: 8119

This book is the comprehensive guide to Samba administration, officially adopted by the Samba Team. Wondering how to integrate Samba's authentication with that of a Windows domain? How to get Samba to serve Microsoft Dfs shares? How to share files on Mac OS X? These and a dozen other issues of interest to system administrators are covered. A whole chapter is dedicated to troubleshooting! The range of this book knows few bounds. Using Samba takes you from basic installation and configuration -- on both the client and server side, for a wide range of systems -- to subtle details of security, cross-platform compatibility, and resource discovery that make the difference between whether users see the folder they expect or a cryptic error message. The current edition covers such advanced 3.x features as: Integration with Active Directory and OpenLDAP Migrating from Windows NT 4.0 domains to Samba Delegating administrative tasks to non-root users Central printer management Advanced file serving features, such as making use of Virtual File System (VFS) plugins. Samba is a cross-platform triumph: robust, flexible and fast, it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients. This book will help you make your file and print sharing as powerful and efficient as possible. The authors delve into the internals of the Windows activities and protocols to an unprecedented degree, explaining the strengths and weaknesses of each feature in Windows domains and in Samba itself. Whether you're playing on your personal computer or an enterprise network, on one note or a full three-octave range, Using Samba will give you an efficient and secure server.
Release

Hadoop: The Definitive Guide

Author: Tom White

Publisher: "O'Reilly Media, Inc."

ISBN: 1449338771

Category: Computers

Page: 688

View: 8807

Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. This book is ideal for programmers looking to analyze datasets of any size, and for administrators who want to set up and run Hadoop clusters. You’ll find illuminating case studies that demonstrate how Hadoop is used to solve specific problems. This third edition covers recent changes to Hadoop, including material on the new MapReduce API, as well as MapReduce 2 and its more flexible execution model (YARN). Store large datasets with the Hadoop Distributed File System (HDFS) Run distributed computations with MapReduce Use Hadoop’s data and I/O building blocks for compression, data integrity, serialization (including Avro), and persistence Discover common pitfalls and advanced features for writing real-world MapReduce programs Design, build, and administer a dedicated Hadoop cluster—or run Hadoop in the cloud Load data from relational databases into HDFS, using Sqoop Perform large-scale data processing with the Pig query language Analyze datasets with Hive, Hadoop’s data warehousing system Take advantage of HBase for structured and semi-structured data, and ZooKeeper for building distributed systems
Release

Network Security with OpenSSL

Cryptography for Secure Communications

Author: John Viega,Matt Messier,Pravir Chandra

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596551971

Category: Computers

Page: 386

View: 1241

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.
Release

HBase

The Definitive Guide

Author: Lars George

Publisher: "O'Reilly Media, Inc."

ISBN: 1449396100

Category: Computers

Page: 522

View: 9363

If your organization is looking for a storage solution to accommodate a virtually endless amount of data, this book will show you how Apache HBase can fulfill your needs. As the open source implementation of Google's BigTable architecture, HBase scales to billions of rows and millions of columns, while ensuring that write and read performance remain constant.HBase: The Definitive Guideprovides the details you require, whether you simply want to evaluate this high-performance, non-relational database, or put it into practice right away. HBase's adoption rate is beginning to climb, and several IT executives are asking pointed questions about this high-capacity database. This is the only book available to give you meaningful answers. Learn how to distribute large datasets across an inexpensive cluster of commodity servers Develop HBase clients in many programming languages, including Java, Python, and Ruby Get details on HBase's primary storage system, HDFS—Hadoop’s distributed and replicated filesystem Learn how HBase's native interface to Hadoop’s MapReduce framework enables easy development and execution of batch jobs that can scan entire tables Discover the integration between HBase and other facets of the Apache Hadoop project
Release

The Official Samba-3 HOWTO and Reference Guide

Author: John H. Terpstra,Jelmer R. Vernooij

Publisher: Prentice Hall Professional

ISBN: 9780131453555

Category: Computers

Page: 685

View: 4204

A guide to the features of Samba-3 provides step-by-step installation instructions on integrating Samba into a Windows or UNIX environment.
Release

Mastering OpenLDAP

Configuring, Securing, and Integrating Directory Services

Author: Matt Butcher

Publisher: Packt Publishing Ltd

ISBN: 1847191037

Category: Computers

Page: 467

View: 6409

Install, Configure, Build, and Integrate Secure Directory Services with OpenLDAP server in a networked environment
Release

LDAP System Administration

Putting Directories to Work

Author: Gerald Carter

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596551919

Category: Computers

Page: 312

View: 7009

Be more productive and make your life easier. That's what LDAP System Administration is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately "see" the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux® distributions and Mac OS® X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses: Configuration and access control Distributed directories; replication and referral Using OpenLDAP to replace NIS Using OpenLDAP to manage email configurations Using LDAP for abstraction with FTP and HTTP servers, Samba, and Radius Interoperating with different LDAP servers, including Active Directory Programming using Net::LDAP If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.
Release

Implementing Samba 4

Author: Marcelo Leal

Publisher: Packt Publishing Ltd

ISBN: 1782166599

Category: Computers

Page: 284

View: 4709

This book is an implementation tutorial covering step-by-step procedures, examples, and sample code, and has a practical approach to set up a Samba 4 Server as an Active Directory Domain Controller and also set up different Samba 4 server roles. This book is ideal for system administrators who are new to the Samba 4 software, and who are looking to get a good grounding in how to use Samba 4 to implement Active Directory Services. It's assumed that you will have some experience with general system administration, Active Directory, and GNU/Linux systems. Readers are expected to have some test machines (virtual machines), which will be used to execute the examples within this book.
Release

PNG

The Definitive Guide

Author: Greg Roelofs

Publisher: Oreilly & Associates Incorporated

ISBN: 9781565925427

Category: Computers

Page: 321

View: 1192

Helps graphic designers get the most out of this nextgeneration graphics file format and programmers who want to add full PNGsupport to their own applications by emphasizing the implementation of PNG with the libng C library and discussing such improvements as gamma correction and standard color spaces. Original. (Intermediate)
Release

Tomcat: The Definitive Guide

The Definitive Guide

Author: Jason Brittain,Ian F. Darwin

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596554941

Category: Computers

Page: 496

View: 2210

It takes a book as versatile as its subject to cover Apache Tomcat, the popular open source Servlet and JSP container and high performance web server. Tomcat: The Definitive Guide is a valuable reference for administrators and webmasters, a useful guide for programmers who want to use Tomcat as their web application server during development or in production, and an excellent introduction for anyone interested in Tomcat. Updated for the latest version of Tomcat, this new edition offers a complete guide to installing, configuring, maintaining and securing this servlet container. In fact, with such a wealth of new information, this is essentially a new book rather than a simple revision. You will find details for using Tomcat on all major platforms, including Windows, Linux, OS X, Solaris, and FreeBSD, along with specifics on Tomcat configuration files, and step-by-step advice for deploying and running web applications. This book offers complete information for: Installation and startup procedures Configuring Tomcat-including realms, roles, users, servlet sessions, and JNDI resources including JDBC DataSources Deploying web applications-individual servlets and JSP pages, and web application archive files Tuning Tomcat to measure and improve performance Integrating Tomcat with Apache Web Server Securing Tomcat to keep online thugs at bay Tomcat configuration files-server.xml and web.xml, and more Debugging and Troubleshooting-diagnosing problems with Tomcat or a web application Compiling your own Tomcat, rather than using the pre-built release Running two or more Tomcat servlet containers in parallel This book also offers an overview of the Tomcat open source project's community resources, including docs, mailing lists, and more. Community interest fueled a strong demand for a Tomcat guide from O'Reilly. The result clearly exceeds expectations.
Release

Hadoop Operations and Cluster Management Cookbook

Author: Shumin Guo

Publisher: Packt Publishing Ltd

ISBN: 1782165177

Category: Computers

Page: 368

View: 8601

Solve specific problems using individual self-contained code recipes, or work through the book to develop your capabilities. This book is packed with easy-to-follow code and commands used for illustration, which makes your learning curve easy and quick.If you are a Hadoop cluster system administrator with Unix/Linux system management experience and you are looking to get a good grounding in how to set up and manage a Hadoop cluster, then this book is for you. It's assumed that you will have some experience in Unix/Linux command line already, as well as being familiar with network communication basics.
Release

Hadoop Security

Protecting Your Big Data Platform

Author: Ben Spivey,Joey Echeverria

Publisher: "O'Reilly Media, Inc."

ISBN: 1491901349

Category: Computers

Page: 340

View: 7850

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach. Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases. Understand the challenges of securing distributed systems, particularly Hadoop Use best practices for preparing Hadoop cluster hardware as securely as possible Get an overview of the Kerberos network authentication protocol Delve into authorization and accounting principles as they apply to Hadoop Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest Integrate Hadoop data ingest into enterprise-wide security architecture Ensure that security architecture reaches all the way to end-user access
Release

Linux in a Windows World

Author: Roderick W. Smith

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596007584

Category: Computers

Page: 478

View: 2767

A companion for any system administrator interested in integrating Linux into their Windows environment. This book takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows system. With tips and techniques, it has the practical advice you need to migrate to this software.
Release

The Linux Command Line

A Complete Introduction

Author: William E. Shotts, Jr.

Publisher: No Starch Press

ISBN: 1593273894

Category: COMPUTERS

Page: 480

View: 8801

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more. In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore. As you make your way through the book's short, easily-digestible chapters, you'll learn how to: * Create and delete files, directories, and symlinks * Administer your system, including networking, package installation, and process management * Use standard input and output, redirection, and pipelines * Edit files with Vi, the world’s most popular text editor * Write shell scripts to automate common or boring tasks * Slice and dice text files with cut, paste, grep, patch, and sed Once you overcome your initial "shell shock," you'll find that the command line is a natural and expressive way to communicate with your computer. Just don't be surprised if your mouse starts to gather dust. A featured resource in the Linux Foundation's "Evolution of a SysAdmin"
Release

Inside Active Directory

A System Administrator's Guide

Author: Sakari Kouti,Mika Seitsonen

Publisher: Addison-Wesley Professional

ISBN: 9780201616217

Category: Computers

Page: 927

View: 5137

This guide to the design, architecture, topology, installation and management of the Active Directory and its services includes schemas, LDAP, DNS, administration scripts, Internet protocols, replication, security and more.
Release

Professional Microsoft IIS 8

Author: Kenneth Schaefer,Jeff Cochran,Scott Forsyth,Dennis Glendenning,Benjamin Perkins

Publisher: John Wiley & Sons

ISBN: 1118417372

Category: Computers

Page: 984

View: 5279

Stellar author team of Microsoft MVPs helps developers and administrators get the most out of Windows IIS 8 If you're a developer or administrator, you'll want to get thoroughly up to speed on Microsoft's new IIS 8 platform with this complete, in-depth reference. Prepare yourself to administer IIS 8 in not only commercial websites and corporate intranets, but also the mass web hosting market with this expert content. The book covers common administrative tasks associated with monitoring and managing an IIS environment--and then moves well beyond, into extensibility, scripted admin, and other complex topics. The book highlights automated options outside the GUI, options that include the PowerShell provider and AppCmd tool. It explores extensibility options for developers, including ISAPI and HTTPModules. And, it delves into security protocols and high availability/load balancing at a level of detail that is not often found in IIS books. Author team includes Microsoft MVPs and an IIS team member Covers the management and monitoring of Microsoft Internet Information Services (IIS) 8 for administrators and developers, including MOF and MOM Delves into topics not often included in IIS books, including using the PowerShell provider and AppCmd tool and other automated options, and extending IIS 8 with ISAPI or HTTPModules Explores security issues in depth, including high availability/load balancing, and the Kerberos, NTLM, and PKI/SSL protocols Explains how to debug and troubleshoot IIS Professional Microsoft IIS 8 features a wealth of information gathered from individuals running major intranets and web hosting facilities today, making this an indispensible and real-world reference to keep on hand.
Release