MOMENTAN AUSVERKAUFT

Solaris 10 Security Essentials by Sun Microsystems Staff, Sharon Veach and Jim Siwila (2009, Trade Paperback)

Über dieses Produkt

Product Identifiers

PublisherPrentice Hall PTR
ISBN-100137012330
ISBN-139780137012336
eBay Product ID (ePID)71199687

Product Key Features

Number of Pages312 Pages
Publication NameSolaris 10 Security Essentials
LanguageEnglish
Publication Year2009
SubjectOperating Systems / General, Security / Networking
TypeTextbook
AuthorSun Microsystems Staff, Sharon Veach, Jim Siwila
Subject AreaComputers
FormatTrade Paperback

Dimensions

Item Height0.7 in
Item Weight17.3 Oz
Item Length9 in
Item Width7.1 in

Additional Product Features

Intended AudienceScholarly & Professional
LCCN2009-034603
Dewey Edition22
IllustratedYes
Dewey Decimal005.8
Synopsis"Solaris" " 10 Security Essentials "describes the various security technologies contained in the Solaris operating system. The book describes how to make installations secure and how to configure the OS to the particular needs of your environment, whether your systems are on the edge of the Internet or running a data center. The authors present the material in a straightforward way that makes a seemingly arcane subject accessible to system administrators at all levels. The strengths of the Solaris operating system s security model are its scalability and its adaptability. It can protect a single user with login authentication or multiple users with Internet and intranet configurations requiring user-rights management, authentication, encryption, IP security, key management, and more. This book is written for users who need to secure their laptops, network administrators who must secure an entire company, and everyone in between. The book s topics include Zones virtualization security System hardening Trusted Extensions (Multi-layered Security) Privileges and role-based access control (RBAC) Cryptographic services and key management Auditing Network security Pluggable Authentication Modules (PAM) "Solaris" " 10 Security Essentials "is the first in a new series on Solaris system administration. It is a superb guide to deploying and managing secure computer environments.", Solaris (tm) 10 Security Essentials describes the various security technologies contained in the Solaris operating system. The book describes how to make installations secure and how to configure the OS to the particular needs of your environment, whether your systems are on the edge of the Internet or running a data center. The authors present the material in a straightforward way that makes a seemingly arcane subject accessible to system administrators at all levels.   The strengths of the Solaris operating system's security model are its scalability and its adaptability. It can protect a single user with login authentication or multiple users with Internet and intranet configurations requiring user-rights management, authentication, encryption, IP security, key management, and more. This book is written for users who need to secure their laptops, network administrators who must secure an entire company, and everyone in between.   The book's topics include Zones virtualization security System hardening Trusted Extensions (Multi-layered Security) Privileges and role-based access control (RBAC) Cryptographic services and key management Auditing Network security Pluggable Authentication Modules (PAM) Solaris (tm) 10 Security Essentials is the first in a new series on Solaris system administration. It is a superb guide to deploying and managing secure computer environments., Solaris (tm) 10 Security Essentials describes the various security technologies contained in the Solaris operating system. The book describes how to make installations secure and how to configure the OS to the particular needs of your environment, whether your systems are on the edge of the Internet or running a data center. The authors present the material in a straightforward way that makes a seemingly arcane subject accessible to system administrators at all levels. The strengths of the Solaris operating system's security model are its scalability and its adaptability. It can protect a single user with login authentication or multiple users with Internet and intranet configurations requiring user-rights management, authentication, encryption, IP security, key management, and more. This book is written for users who need to secure their laptops, network administrators who must secure an entire company, and everyone in between. The book's topics include Zones virtualization security System hardening Trusted Extensions (Multi-layered Security) Privileges and role-based access control (RBAC) Cryptographic services and key management Auditing Network security Pluggable Authentication Modules (PAM) Solaris (tm) 10 Security Essentials is the first in a new series on Solaris system administration. It is a superb guide to deploying and managing secure computer environments.
LC Classification NumberQA76.9.A25