Cargando…

Solaris security essentials.

Solaris "!10 Security Essentials describes the various security technologies contained in the Solaris operating system. The book describes how to make installations secure and how to configure the OS to the particular needs of your environment, whether your systems are on the edge of the Intern...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Upper Saddle River, N.J.] : Prentice Hall, 2009.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn319430975
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 090427s2009 njua o 000 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d CEF  |d OCLCQ  |d DEBSZ  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCA  |d CZL  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9780131365414 
020 |a 013136541X 
029 1 |a CHBIS  |b 006149034 
029 1 |a CHVBK  |b 171234731 
029 1 |a DEBSZ  |b 355395819 
029 1 |a GBVCP  |b 882876945 
029 1 |a HEBIS  |b 291469019 
035 |a (OCoLC)319430975 
037 |a CL0500000038  |b Safari Books Online 
050 4 |a QA76.9.A25  |b S34 
082 0 4 |a 005.8  |q OCoLC  |2 22/eng/20230216 
049 |a UAMI 
245 0 0 |a Solaris security essentials. 
260 |a [Upper Saddle River, N.J.] :  |b Prentice Hall,  |c 2009. 
300 |a 1 online resource (1 volume (unpaged)) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from resource description page (viewed Apr 10, 2009). 
588 0 |a Print version record. 
520 |a Solaris "!10 Security Essentials describes the various security technologies contained in the Solaris operating system. The book describes how to make installations secure and how to configure the OS to the particular needs of your environment, whether your systems are on the edge of the Internet or running a data center. The authors present the material in a straightforward way that makes a seemingly arcane subject accessible to system administrators at all levels. The strengths of the Solaris operating system's security model are its scalability and its adaptability. It can protect a single user with login authentication or multiple users with Internet and intranet configurations requiring user-rights management, authentication, encryption, IP security, key management, and more. This book is written for users who need to secure their laptops, network administrators who must secure an entire company, and everyone in between. The book's topics include Zones virtualization security System hardening Trusted Extensions (Multi-layered Security) Privileges and role-based access control (RBAC) Cryptographic services and key management Auditing Network security Pluggable Authentication Modules (PAM) Solaris "!10 Security Essentials is the first in a new series on Solaris system administration. It is a superb guide to deploying and managing secure computer environments 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Solaris (Computer file) 
630 0 7 |a Solaris (Computer file)  |2 blmlsh 
630 0 7 |a Solaris (Computer file)  |2 fast 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer security  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780131365414/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP