Data, information, and applications are the digital assets of an organization. As these pillars expand and are deployed across different nodes, communication between these nodes becomes vital, and with communication comes the risk of compromising the data exchanged in the process. Thus, securing data and the means of networking are an essential part of any product. Authentication is not only a security measure, but also a necessary feature. Making sure that no one can tap into the data unless permitted to is one of the critical requirements for a product. In the previous chapter, we implemented the clustering technique that helped distribute GIS services evenly across machines so that they run effectively. However, it is important as well to make sure that these GIS services are properly secured against unauthorized access. ArcGIS for Server depends heavily on networking, so your data can be delivered and consumed as GIS services. The silver lining is...
Administering ArcGIS for Server
By :
Administering ArcGIS for Server
By:
Overview of this book
Table of Contents (18 chapters)
Administering ArcGIS for Server
Credits
Foreword
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Best Practices for Installing ArcGIS for Server
Authoring Web Services
Consuming GIS Services
Planning and Designing GIS Services
Optimizing GIS Services
Clustering and Load Balancing
Securing ArcGIS for Server
Server Logs
Selecting the Right Hardware
Server Architecture
Index
Customer Reviews