Security and Personalization
This chapter explains why securing an intranet is important and outlines a variety of approaches that can be taken. Once the decision about security has been made, you’ll likely find that the personalization issue has simultaneously been decided. This is because the user identification process inherent in a security authorization scheme will naturally extend to customizing that user’s experience according to their security profile or other extended settings. Then, when basic customization is occurring, it’s not a very significant theoretical step towards complete personalization (by either the system or the users themselves).
KeywordsSmart Card Security Policy Intrusion Detection System Certificate Authority Virtual Private Networking
Unable to display preview. Download preview PDF.