Have you ever worked in an environment where 10 or more different user credentials and passwords are required for different applications and services.What if, the number of applications and user credentials are even more?
read more | digg story
Wednesday, September 10, 2008
Kerberos - a Single Sign-on Network Security Tool
at
7:04 PM
·
Subscribe to:
Post Comments (Atom)
Subscribe free via email
My Favourite Blog List
Blog to watch
Labels
- Access Control (1)
- Anti-Virus (2)
- Article from Others (47)
- backup and Recovery (1)
- CAAT (1)
- Cryptography (1)
- Cyber Security (11)
- Data Protection (6)
- Data Security (10)
- Decision Support System (1)
- DMZ (1)
- Error detection (2)
- Firewall (2)
- Firewall audit (2)
- Google (1)
- Hacking (4)
- Identity Stealing (3)
- IDS (1)
- Information Security (51)
- internet (5)
- IS Audit (5)
- IT Risk (3)
- Kerberos (1)
- Media disposal (1)
- Network Security (2)
- Networking (1)
- OpenID (1)
- Outsourcing (1)
- password (1)
- Penetration Testing (3)
- PKI (1)
- Privacy (1)
- Programming (1)
- SAS 70 (1)
- Single Sign-on (1)
- Social Engineering (1)
- SSO (1)
- sysAdmin (1)
- System Administration (1)
- Vulnerability Assessment (1)
- Web security (4)
- Wireless network (2)
- WLAN (1)
0 comments:
Post a Comment