|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1373596355 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
230320s2023 xx 114 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d OCLCO
|
020 |
|
|
|a 9781837639304
|q (electronic video)
|
020 |
|
|
|a 1837639302
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000074212499
|
035 |
|
|
|a (OCoLC)1373596355
|
037 |
|
|
|a 9781837639304
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20230320
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Linux PAM security administration.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c [2023]
|
300 |
|
|
|a 1 online resource (1 video file (1 hr., 54 min.)) :
|b sound, color.
|
306 |
|
|
|a 015400
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Imran Afzal, presenter.
|
500 |
|
|
|a "Published in March 2023."
|
520 |
|
|
|a PAM provides dynamic authentication support that sits between Linux applications and Linux native authentication systems. It is one of the main tools that deals with authentication. The main purpose of PAM is to allow system administrators to integrate services or programs with different authentication mechanisms without changing the code for the service. This short course consists of three sections. In the first section, the author introduces you to the course and what to expect from the course. In the second section, you will learn to install VirtualBox in your systems and create your first virtual machine. Following this, you will be installing CentOS 7 and 8 onto your systems. In the third and last section of the course, you will learn about Linux PAM security, where you will understand the importance of PAM. You will get to know the PAM configuration file and the columns within the file; namely, the module interface, control flags, and modules one by one. In the last part of the section, you will explore PAM-aware services and stacks and verify if a service or a program is linked with PAM. By the end of the course, you will be able to understand why PAM is important and how to configure it. What You Will Learn Installation of VirtualBox and CentOS Learn about the module interface column in PAM file Learn about the control flags column in PAM Learn about the module column in PAM file Learn the importance of PAM and its necessity Learn account access through PAM Audience This course is designed for Linux administrators and beginners and for anyone interested in learning about security in Linux servers. No prior knowledge of Linux is required to take this course. About The Author Imran Afzal: Imran Afzal is a systems engineer/manager, entrepreneur, instructor, and a public speaker. He started his career with Time Warner in 2000 as a systems administrator. He was involved in deploying technologies such as DTV, VOD, CableCards, and others. These technologies were built on many Linux distributions. Since then, he has utilized Linux/Unix skills in many Fortune 500 companies. He has worn many different hats and currently manages a large team of systems engineers, administrators and team leads globally. He has spearheaded projects such as datacenter migration, introduction, and deployment of VMware, monitoring tools implementation, Amazon cloud migration, and many more. He is certified in Linux Systems Management, UNIX Operating Systems, Linux System Administration, System Internals, VMWare Certified Professional, RHCSA, and Windows Server Certified.
|
588 |
|
|
|a Online resource; title from title details screen (O'Reilly, viewed March 20, 2023).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Linux.
|
630 |
0 |
7 |
|a Linux
|2 fast
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Afzal, Imran,
|e author.
|
710 |
2 |
|
|a Packt Publishing,
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781837639304/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|