|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn560315618 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
031015s2002 xxua ob 001 0 eng d |
040 |
|
|
|a MERUC
|b eng
|e pn
|c MERUC
|d CCO
|d E7B
|d OCLCQ
|d UV0
|d DKDLA
|d OCLCQ
|d OCLCO
|d OCLCQ
|d UMI
|d OCLCA
|d DEBSZ
|d OCLCQ
|d OCLCF
|d EBLCP
|d OCLCQ
|d COO
|d AZK
|d CNNOR
|d MOR
|d PIFBR
|d ZCU
|d MERUC
|d OCLCQ
|d OCLCO
|d U3W
|d OCLCA
|d BRL
|d STF
|d WRM
|d CEF
|d ICG
|d NRAMU
|d VT2
|d OCLCA
|d OCLCQ
|d OCLCO
|d WYU
|d A6Q
|d DKC
|d AU@
|d OCLCQ
|d HS0
|d UWK
|d OCLCQ
|d OCLCO
|d OCLCQ
|d UKCRE
|d VLY
|d CZL
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 228173539
|a 228173541
|a 475358593
|a 647470684
|a 832739858
|a 961554616
|a 962573223
|a 988488076
|a 991986573
|a 1037407836
|a 1037934426
|a 1038644588
|a 1045533638
|a 1081227771
|a 1083554303
|a 1103268977
|a 1109340772
|a 1110301469
|a 1129377591
|a 1153040445
|
020 |
|
|
|a 9780738427898
|
020 |
|
|
|a 0738427896
|
020 |
|
|
|z 0738427896
|
029 |
1 |
|
|a AU@
|b 000050965746
|
029 |
1 |
|
|a AU@
|b 000050968995
|
029 |
1 |
|
|a AU@
|b 000053018406
|
029 |
1 |
|
|a DEBBG
|b BV041121373
|
029 |
1 |
|
|a DEBBG
|b BV044100637
|
029 |
1 |
|
|a DEBSZ
|b 396762719
|
029 |
1 |
|
|a NZ1
|b 12063322
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999936993405765
|
035 |
|
|
|a (OCoLC)560315618
|z (OCoLC)228173539
|z (OCoLC)228173541
|z (OCoLC)475358593
|z (OCoLC)647470684
|z (OCoLC)832739858
|z (OCoLC)961554616
|z (OCoLC)962573223
|z (OCoLC)988488076
|z (OCoLC)991986573
|z (OCoLC)1037407836
|z (OCoLC)1037934426
|z (OCoLC)1038644588
|z (OCoLC)1045533638
|z (OCoLC)1081227771
|z (OCoLC)1083554303
|z (OCoLC)1103268977
|z (OCoLC)1109340772
|z (OCoLC)1110301469
|z (OCoLC)1129377591
|z (OCoLC)1153040445
|
037 |
|
|
|a CL0500000204
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b I585 2002eb
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
3 |
|a An introduction to security in a CSM 1.3 for AIX 5L environment /
|c [Octavian Lascu and others].
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a [Place of publication not identified] :
|b IBM International Technical Support Organization,
|c 2002.
|
300 |
|
|
|a 1 online resource (xiv, 100 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a IBM redbooks
|
500 |
|
|
|a "December 2002."
|
500 |
|
|
|a "SG24-6873-00."
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
520 |
|
|
|a This IBM Redbooks publication contains information about the first official release of the new clustering software IBM Cluster Systems Management (CSM) on AIX 5L Version 5.2. Features include base cluster configuration and management, Resource Monitoring and Control (RMC), subsystem access control list setup for shipped CSM resource managers, hardware control, configuration file management, distributed command execution, and a distributed GUI based on the AIX WebSM infrastructure. Included in this release of CSM is a complete set of base security functions based on IBM host-based authentication (HBA) and offered through an abstraction layer in the CSM software. CSM automatically configures HBA for use by the cluster services and establishes secure cluster communications for the shipped CSM resource managers. The first part of this publication is conceptual and includes an introduction to security for CSM 1.3 for AIX 5L, security concepts and components, and CSM security infrastructure. Next, practical security considerations are provided. Topics, such as network considerations, security in an heterogeneous environment, and security considerations for hardware control, are discussed. The last part of this publication details secure remote command execution, as well as security administration. Among the topics covered are remote command execution software, OpenSSH installation, and administration of RMC.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a IBM Cluster systems management.
|
630 |
0 |
0 |
|a AIX (Computer file)
|
630 |
0 |
7 |
|a IBM Cluster systems management.
|2 blmlsh
|
630 |
0 |
7 |
|a AIX (Computer file)
|2 blmlsh
|
630 |
0 |
7 |
|a AIX (Computer file)
|2 fast
|0 (OCoLC)fst01377569
|
630 |
0 |
7 |
|a IBM Cluster systems management.
|2 fast
|0 (OCoLC)fst01399447
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
700 |
1 |
|
|a Lascu, Octavian.
|
710 |
2 |
|
|a International Business Machines Corporation.
|b International Technical Support Organization.
|
776 |
0 |
8 |
|i Print version:
|t Introduction to security in a CSM 1.3 for AIX 5L environment.
|b 1st ed.
|d [S.l.] : IBM International Technical Support Organization, 2002
|z 0738427896
|w (DLC) 2003276964
|w (OCoLC)55138880
|
830 |
|
0 |
|a IBM redbooks.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0738427896/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL3306712
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10112805
|
994 |
|
|
|a 92
|b IZTAP
|