12,99 €
inkl. MwSt.

Versandfertig in über 4 Wochen
  • Broschiertes Buch

Protecting corporate assets from security breaches is a compelling concern an organization's productivity, brand reputation and consumer confidence can all depend on it. Implementing proper information security measures is also the first step towards minimizing production down time due to system failure - one of the primary goals of every organization.During the author's extensive experience as a system and security administrator for numerous large and medium-size companies, it was not unusual for operation and production management to prohibit the installation of any third-party applications…mehr

Produktbeschreibung
Protecting corporate assets from security breaches is a compelling concern an organization's productivity, brand reputation and consumer confidence can all depend on it. Implementing proper information security measures is also the first step towards minimizing production down time due to system failure - one of the primary goals of every organization.During the author's extensive experience as a system and security administrator for numerous large and medium-size companies, it was not unusual for operation and production management to prohibit the installation of any third-party applications - "unsupported" freeware and open-source applications for hardening security, especially on production machines. This was partially due to strict policies from vendors providing operating system support. It was also because of company security policies prohibiting downloading from the Internet and installing any applications that have not been thoroughly tested, regardless of how well these applications can secure the production box. Therefore, in many cases you will not be able to use any third-party tools.This book was written to help system and security administrators set up a secure UNIX operating system environment by using the native capabilities of the "pure" operating system. As you read this book, you will learn that with your knowledge of the operating system and information security, it is possible to do a great deal to create a "hard" operating environment by using only the tools and utilities that come bundled with UNIX.This book not only discusses security measures, but actually shows you how particular measures can be implemented. Use it when you need a practical solution for a security problem.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.