Paperback: 344 pages
Publisher: Apress; 1st ed. edition (November 4, 2004)
Language: English
ISBN-10: 1590594134
ISBN-13: 978-1590594131
Product Dimensions: 7 x 0.8 x 9.2 inches
Shipping Weight: 1.5 pounds (View shipping rates and policies)
Average Customer Review: 3.2 out of 5 stars See all reviews (12 customer reviews)
Best Sellers Rank: #2,973,501 in Books (See Top 100 in Books) #42 in Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > LDAP #1216 in Books > Computers & Technology > Networking & Cloud Computing > Data in the Enterprise > Client-Server Systems #3066 in Books > Textbooks > Computer Science > Networking
This is a book produced by merging numerous publicly available materials without too much input from the author. The author seems at a loss what to say when the good stuff is already said by others (other than changing "does not" to "doesn't", etc). Here're some suggestions, in case he plans to write a new edition. For instance, p.77, the first two search filter examples are too easy. But the third one needs a few seconds' thinking. Why not keep building progressively more complicated filters? They would be guaranteed not to be in existing materials. p.144, ACI parameter realm suddenly appears. This "realm" sounds different from that in SASL (p.98 and p.115). But "realm" is never explained anywhere in the book. There're other terms that mean differently but are not explained, such as NSS (p.136 for "Network Security Services" and p.249 for "Name Service Switch"). There're other places in the book that mention something only explained in later chapters, but they're not warned with "We'll explain this in Chapter XXX". The reason is simply that he copies a man page or somebody's article without thinking of adding anything to it. Arrangement of the text is sometimes unexpected. After about 20 pages of Perl methods copied from documentation, p.164 suddenly shows a program in C, not Perl.This 2005 book discusses technologies of as early as 1998 (not in history section). It may be true that AuthLDAP and TransLDAP modules are not updated since then and C. Donley's web site is gone (pp.264-8). But a responsible book author should tell us anything new around this technology. You shouldn't duplicate Mr. Donley's 1998 article with no comments (and no credit).
Deploying OpenLDAP Active Directory: Designing, Deploying, and Running Active Directory Using Docker: Developing and Deploying Software with Containers Exam Ref 70-345 Designing and Deploying Microsoft Exchange Server 2016 Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud Deploying Voice over Wireless LANs LDAP in the Solaris Operating Environment: Deploying Secure Directory Services Designing and Deploying 802.11 Wireless Networks: A Practical Guide to Implementing 802.11n and 802.11ac Wireless Networks For Enterprise-Based Applications (2nd Edition) (Networking Technology) Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7 Extreme Programming with Ant: Building and Deploying Java Applications with JSP, EJB, XSLT, XDoclet, and JUnit Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions (Addison-Wesley Signature Series (Fowler)) White Reign: Deploying Whiteness in America