First to market! Written by two of the leading Solaris security experts, this Sun Certified Security Administrator for Solaris 10 study guide is the only exam prep book for this difficult certification exam Learn from an integrated study system based on proven pedagogy, including step-by-step exercises, on-the-job elements, chapter self-tests and more. Run the UNIX based exam engine - included for Sun purists.
First to market! Written by two of the leading Solaris security experts, this Sun Certified Security Administrator for Solaris 10 study guide is the only exam prep book for this difficult certification exam Learn from an integrated study system based on proven pedagogy, including step-by-step exercises, on-the-job elements, chapter self-tests and more. Run the UNIX based exam engine - included for Sun purists.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide
Inhaltsangabe
About the Contributors Acknowledgments Preface Introduction Part I: General Security Concepts Chapter 1: Fundamental Security Concepts Chapter 2: Attacks, Motives, and Methods Chapter 3: Security Management and Standards Part II: Detection and Device Management Chapter 4: Logging and Process Accounting Chapter 5: Solaris Auditing, Planning, and Management Chapter 6: Device, System, and File Security Part III: Security Attacks Chapter 7: Denial of Service Attacks Chapter 8: Remote Access Attacks PartIV: File and System Resources Protection Chapter 9: User and Domain Account Management with RBAC Chapter 10: Fundamentals of Access Control Part V: Solaris Cryptographic Framework Chapter 11: Using Cryptographic Services Part VI: Authentication Services and Secure Communication Chapter 12: Secure RPC Across NFS and PAM Chapter 13: SASL and Secure Shell Chapter 14: Sun Enterprise Authentication Mechanism Part VII: Appendices Appendix A: Final Test Study Guide Appendix B: Final Test Appendix C: Final Test Answers Appendix D: Hands-On Exercises and Solutions Index
About the Contributors Acknowledgments Preface Introduction Part I: General Security Concepts Chapter 1: Fundamental Security Concepts Chapter 2: Attacks, Motives, and Methods Chapter 3: Security Management and Standards Part II: Detection and Device Management Chapter 4: Logging and Process Accounting Chapter 5: Solaris Auditing, Planning, and Management Chapter 6: Device, System, and File Security Part III: Security Attacks Chapter 7: Denial of Service Attacks Chapter 8: Remote Access Attacks PartIV: File and System Resources Protection Chapter 9: User and Domain Account Management with RBAC Chapter 10: Fundamentals of Access Control Part V: Solaris Cryptographic Framework Chapter 11: Using Cryptographic Services Part VI: Authentication Services and Secure Communication Chapter 12: Secure RPC Across NFS and PAM Chapter 13: SASL and Secure Shell Chapter 14: Sun Enterprise Authentication Mechanism Part VII: Appendices Appendix A: Final Test Study Guide Appendix B: Final Test Appendix C: Final Test Answers Appendix D: Hands-On Exercises and Solutions Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826