Cargando…

AIX 5L version 5.2 security supplement /

This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of s...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Tuttle, Steven
Otros Autores: Pizano, Gabriel, Smith, Chris
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Austin, TX : IBM Corp., International Technical Support Organization, ©2003.
Colección:IBM redbooks.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_ocn614898224
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 050818s2003 txua ob 001 0 eng d
010 |a  2004558867 
040 |a CaPaEBR  |b eng  |e pn  |c ADU  |d E7B  |d OCLCQ  |d UV0  |d DKDLA  |d OCLCQ  |d OCLCO  |d OCLCQ  |d UMI  |d DEBSZ  |d OCLCQ  |d EBLCP  |d OCLCQ  |d OCLCF  |d COO  |d OCLCQ  |d AZK  |d LOA  |d CNNOR  |d MOR  |d PIFBR  |d ZCU  |d MERUC  |d OCLCQ  |d U3W  |d BRL  |d OCLCO  |d STF  |d WRM  |d CEF  |d NRAMU  |d ICG  |d VT2  |d OCLCQ  |d OCLCO  |d WYU  |d A6Q  |d DKC  |d OCLCQ  |d OCLCO  |d VLY  |d SGP  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 228139555  |a 466464930  |a 488495192  |a 647465621  |a 722431081  |a 829407023  |a 888610642  |a 961662605  |a 962580793  |a 965978332  |a 988470096  |a 991992550  |a 1037436474  |a 1037910729  |a 1038653247  |a 1045546420  |a 1055348152  |a 1064017887  |a 1081206281  |a 1083601792  |a 1162051886  |a 1192347863  |a 1228602572  |a 1240526574 
020 |a 9780738499079 
020 |a 0738499072 
020 |z 0738499072 
029 1 |a AU@  |b 000050767457 
029 1 |a AU@  |b 000053238499 
029 1 |a DEBBG  |b BV041120502 
029 1 |a DEBBG  |b BV044100303 
029 1 |a DEBSZ  |b 396754007 
029 1 |a NZ1  |b 12041602 
035 |a (OCoLC)614898224  |z (OCoLC)228139555  |z (OCoLC)466464930  |z (OCoLC)488495192  |z (OCoLC)647465621  |z (OCoLC)722431081  |z (OCoLC)829407023  |z (OCoLC)888610642  |z (OCoLC)961662605  |z (OCoLC)962580793  |z (OCoLC)965978332  |z (OCoLC)988470096  |z (OCoLC)991992550  |z (OCoLC)1037436474  |z (OCoLC)1037910729  |z (OCoLC)1038653247  |z (OCoLC)1045546420  |z (OCoLC)1055348152  |z (OCoLC)1064017887  |z (OCoLC)1081206281  |z (OCoLC)1083601792  |z (OCoLC)1162051886  |z (OCoLC)1192347863  |z (OCoLC)1228602572  |z (OCoLC)1240526574 
037 |a CL0500000198  |b Safari Books Online 
050 4 |a QA76.76.O63  |b T88 2003eb 
049 |a UAMI 
100 1 |a Tuttle, Steven. 
245 1 0 |a AIX 5L version 5.2 security supplement /  |c Steven Tuttle, Gabriel Pizano, Chris Smith. 
260 |a Austin, TX :  |b IBM Corp., International Technical Support Organization,  |c ©2003. 
300 |a 1 online resource (xi, 180 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
490 1 |a Redbooks 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
546 |a English. 
520 |a This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of secure remote commands (RCMDS), Pluggable Authentication Modules (PAM), and examples on how to restrict users. You can use these features individually or integrate them together to improve AIX system security. Use this book as an additional source for security information. Together with existing sources, you may use this book to enhance your knowledge of security and the features included with AIX 5L Version 5.2. You learn about the practical use of these security features, why they are necessary, and how you can use them in your environment to improve security. Plus you gain practical guidance through the examples that are provided and the recommendations for best practice. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a AIX (Computer file) 
630 0 7 |a AIX (Computer file)  |2 blmlsh 
630 0 7 |a AIX (Computer file)  |2 fast 
650 0 |a Operating systems (Computers) 
650 6 |a Systèmes d'exploitation (Ordinateurs) 
650 7 |a operating systems.  |2 aat 
650 7 |a Operating systems (Computers)  |2 fast 
700 1 |a Pizano, Gabriel. 
700 1 |a Smith, Chris. 
758 |i has work:  |a AIX 5L version 5.2 security supplement (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGgJJFbb8WX6f87bBT9X7d  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Tuttle, Steven.  |t AIX 5L version 5.2 security supplement.  |d Austin, TX : IBM Corp., International Technical Support Organization, ©2003  |w (DLC) 2004558867 
830 0 |a IBM redbooks. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=3306378  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/0738499072/?ar  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL3306378 
938 |a ebrary  |b EBRY  |n ebr10112129 
994 |a 92  |b IZTAP