Résumé
- How to configure a secure DNS server
- What to do with /etc/inet/inetd.conf
- How to make IPsec work
- Why DES fails
- How to identify and prevent system compromises
- How not to configure sendmail
- How to automate security checkups
Security threats and vulnerabilities arc an everyday reality in today's infrastructures, and the Solaris operating system is no exception. Solaris 8 Security gives you insight into the organizational and technical approaches that are used to decrease the risks and increase the overall security of Solaris 8 systems. This practical and concise book helps you understand how to secure your Solaris 8 system by using the product's builtin security features as well as open source security tools.
Solaris 8 Security also demystifies topics such as cryptography, security policies, and risk management, presenting them in a format that is both practical and handy. Edgar Danielyan helps you understand security as a process, evaluate and quantity risks, and introduces you to the proven practices and strategies that he has deployed throughout years as a UNIX system administrator.
If you administer a Solaris 8 system, use Solaris 8 Security to:
- Decide which cryptographic algorithms to use and which to avoid
- Configure Solaris 8 system software securely
- Use the advanced security features provided by Solaris 8
- Configure BIND, sendmail, NIS+, NFS, and other network services
- Define your security policy
- Formulate an Acceptable Use Policy (AUP)
- Integrate auditing and accounting into your security policy
- Configure the IP Security Architecture (IPsec)
- Utilize open source security tools in your security plan
- Configure and deploy Kerberos 5, Role-Based Access Control (RBAC), and authentication and authorization
- Preface
- 1: Enterprise Security Framework
- 2: Security and Cryptography
- 3: System Security
- 4: Authentication and Authorization
- 5: Kerberos
- 6: Auditing and Accounting
- 7: Open Source Security Tools
- 8: Network Security
- 9: IP Security Architecture (IPsec)
- 10: Securing Network Services
- A: Internet Protocols
- B: TCP and UDP Port Numbers
- C: Solaris 8 Standards Conformance
- D: Types of Attacks and Vulnerabilities
- E: System and Network Security Checklist
- F: Security Resources
- G: Trusted Solaris 8
- H: SunScreen 3.1 Lite
- Glossary
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | New Riders |
Auteur(s) | Edgar Danielyan |
Parution | 05/02/2002 |
Nb. de pages | 274 |
Format | 17,6 x 22,8 |
Couverture | Broché |
Poids | 468g |
Intérieur | Noir et Blanc |
EAN13 | 9781578702701 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse