Flylib.com
Index_K
Previous page
Table of content
Next page
K
Kerberos protocol
additional reading, 41
constrained delegation and, 343 “44
deriving Main Mode SA from, 226
IPSec authentication with, 255
IPSec policy exemptions and, 231
overview of, 37 “38
Key Management Service.
See
KMS (Key Management Service)
Key Manager, KMS, 280 “84
keys
length of, 20, 264 “65
pairs of, 20
preshared, 227
private, 20 “21
protecting private, 267 “68
KMS (Key Management Service).
See also
Certificate Services
configuring for Exchange 2000, 278 “80
defined, 249
enrolling users with, 282 “84
getting certificates for Outlook, 313 “14
overview of, 269 “70
smart card enrollment, 272
Previous page
Table of content
Next page
Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)
ISBN: 0735619905
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Paul Robichaux
BUY ON AMAZON
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
The Cisco UE System AA
Setting Up a Cisco UE Automated Attendant
TAPI Applications
Step 4: Configuring Extensions and Phones
Troubleshooting Backup and Restore
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Finding the nth Instance of a Substring
Doing a Case-Insensitive String Comparison
Add Margins to a Text File
Introduction
Manipulating an XML Document
SQL Hacks
Hack 10. Convert Subqueries to JOINs
Hack 43. Add Navigation Features to Web Applications
Hack 58. Store Parameters in the Database
Locking and Performance
Hack 98. Find and Stop Long-Running Queries
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
Constants, Variables, and Arrays
Conditional Logic
Appendix B Built-In VBScript Functions
Appendix C Whats on the CD-ROM?
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Attacking Oracle PL/SQL Web Applications
Appendix A Default Usernames and Passwords
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Arrays and Collections
Reflection
Printing and Drawing with GDI+
ASP.NET Web Applications
Remoting and Enterprise Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies