Skip to main content

Security and Personalization

  • Chapter
  • 129 Accesses

Abstract

This chapter explains why securing an intranet is important and outlines a variety of approaches that can be taken. Once the decision about security has been made, you’ll likely find that the personalization issue has simultaneously been decided. This is because the user identification process inherent in a security authorization scheme will naturally extend to customizing that user’s experience according to their security profile or other extended settings. Then, when basic customization is occurring, it’s not a very significant theoretical step towards complete personalization (by either the system or the users themselves).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   29.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   39.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Apress

About this chapter

Cite this chapter

Haas, J. (2003). Security and Personalization. In: Practical Intranet Development. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-5354-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4302-5354-9_11

  • Publisher Name: Apress, Berkeley, CA

  • Print ISBN: 978-1-59059-169-7

  • Online ISBN: 978-1-4302-5354-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics