AIX 5L version 5.2 security supplement /
This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of s...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Austin, TX :
IBM Corp., International Technical Support Organization,
©2003.
|
Colección: | IBM redbooks.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn614898224 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 050818s2003 txua ob 001 0 eng d | ||
010 | |a 2004558867 | ||
040 | |a CaPaEBR |b eng |e pn |c ADU |d E7B |d OCLCQ |d UV0 |d DKDLA |d OCLCQ |d OCLCO |d OCLCQ |d UMI |d DEBSZ |d OCLCQ |d EBLCP |d OCLCQ |d OCLCF |d COO |d OCLCQ |d AZK |d LOA |d CNNOR |d MOR |d PIFBR |d ZCU |d MERUC |d OCLCQ |d U3W |d BRL |d OCLCO |d STF |d WRM |d CEF |d NRAMU |d ICG |d VT2 |d OCLCQ |d OCLCO |d WYU |d A6Q |d DKC |d OCLCQ |d OCLCO |d VLY |d SGP |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 228139555 |a 466464930 |a 488495192 |a 647465621 |a 722431081 |a 829407023 |a 888610642 |a 961662605 |a 962580793 |a 965978332 |a 988470096 |a 991992550 |a 1037436474 |a 1037910729 |a 1038653247 |a 1045546420 |a 1055348152 |a 1064017887 |a 1081206281 |a 1083601792 |a 1162051886 |a 1192347863 |a 1228602572 |a 1240526574 | ||
020 | |a 9780738499079 | ||
020 | |a 0738499072 | ||
020 | |z 0738499072 | ||
029 | 1 | |a AU@ |b 000050767457 | |
029 | 1 | |a AU@ |b 000053238499 | |
029 | 1 | |a DEBBG |b BV041120502 | |
029 | 1 | |a DEBBG |b BV044100303 | |
029 | 1 | |a DEBSZ |b 396754007 | |
029 | 1 | |a NZ1 |b 12041602 | |
035 | |a (OCoLC)614898224 |z (OCoLC)228139555 |z (OCoLC)466464930 |z (OCoLC)488495192 |z (OCoLC)647465621 |z (OCoLC)722431081 |z (OCoLC)829407023 |z (OCoLC)888610642 |z (OCoLC)961662605 |z (OCoLC)962580793 |z (OCoLC)965978332 |z (OCoLC)988470096 |z (OCoLC)991992550 |z (OCoLC)1037436474 |z (OCoLC)1037910729 |z (OCoLC)1038653247 |z (OCoLC)1045546420 |z (OCoLC)1055348152 |z (OCoLC)1064017887 |z (OCoLC)1081206281 |z (OCoLC)1083601792 |z (OCoLC)1162051886 |z (OCoLC)1192347863 |z (OCoLC)1228602572 |z (OCoLC)1240526574 | ||
037 | |a CL0500000198 |b Safari Books Online | ||
050 | 4 | |a QA76.76.O63 |b T88 2003eb | |
049 | |a UAMI | ||
100 | 1 | |a Tuttle, Steven. | |
245 | 1 | 0 | |a AIX 5L version 5.2 security supplement / |c Steven Tuttle, Gabriel Pizano, Chris Smith. |
260 | |a Austin, TX : |b IBM Corp., International Technical Support Organization, |c ©2003. | ||
300 | |a 1 online resource (xi, 180 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
490 | 1 | |a Redbooks | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
520 | |a This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of secure remote commands (RCMDS), Pluggable Authentication Modules (PAM), and examples on how to restrict users. You can use these features individually or integrate them together to improve AIX system security. Use this book as an additional source for security information. Together with existing sources, you may use this book to enhance your knowledge of security and the features included with AIX 5L Version 5.2. You learn about the practical use of these security features, why they are necessary, and how you can use them in your environment to improve security. Plus you gain practical guidance through the examples that are provided and the recommendations for best practice. | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
630 | 0 | 0 | |a AIX (Computer file) |
630 | 0 | 7 | |a AIX (Computer file) |2 blmlsh |
630 | 0 | 7 | |a AIX (Computer file) |2 fast |
650 | 0 | |a Operating systems (Computers) | |
650 | 6 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 7 | |a operating systems. |2 aat | |
650 | 7 | |a Operating systems (Computers) |2 fast | |
700 | 1 | |a Pizano, Gabriel. | |
700 | 1 | |a Smith, Chris. | |
758 | |i has work: |a AIX 5L version 5.2 security supplement (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGgJJFbb8WX6f87bBT9X7d |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Tuttle, Steven. |t AIX 5L version 5.2 security supplement. |d Austin, TX : IBM Corp., International Technical Support Organization, ©2003 |w (DLC) 2004558867 |
830 | 0 | |a IBM redbooks. | |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=3306378 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/0738499072/?ar |z Texto completo |
938 | |a EBL - Ebook Library |b EBLB |n EBL3306378 | ||
938 | |a ebrary |b EBRY |n ebr10112129 | ||
994 | |a 92 |b IZTAP |