Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Solaris 8 Security
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Solaris 8 Security

Solaris 8 Security

Edgar Danielyan

274 pages, parution le 05/02/2002

Résumé

Solaris 8 Security covers all the concepts and issues Solaris 8 administrators need to know in order to make and keep their Solaris 8 systems secure. This includes not only Solaris 8 security tools and features, but such subjects as cryptography and defenses against known attacks and vulnerabilities. Readers learn practical, command-level defenses, such as:
  • How to configure a secure DNS server
  • What to do with /etc/inet/inetd.conf
  • How to make IPsec work
  • Why DES fails
  • How to identify and prevent system compromises
  • How not to configure sendmail
  • How to automate security checkups
The book provides a proactive approach to security. Coverage includes intrusion detection systems, network-level filtering, firewalls and other network-level systems.

Security threats and vulnerabilities arc an everyday reality in today's infrastructures, and the Solaris operating system is no exception. Solaris 8 Security gives you insight into the organizational and technical approaches that are used to decrease the risks and increase the overall security of Solaris 8 systems. This practical and concise book helps you understand how to secure your Solaris 8 system by using the product's builtin security features as well as open source security tools.

Solaris 8 Security also demystifies topics such as cryptography, security policies, and risk management, presenting them in a format that is both practical and handy. Edgar Danielyan helps you understand security as a process, evaluate and quantity risks, and introduces you to the proven practices and strategies that he has deployed throughout years as a UNIX system administrator.

If you administer a Solaris 8 system, use Solaris 8 Security to:

  • Decide which cryptographic algorithms to use and which to avoid
  • Configure Solaris 8 system software securely
  • Use the advanced security features provided by Solaris 8
  • Configure BIND, sendmail, NIS+, NFS, and other network services
  • Define your security policy
  • Formulate an Acceptable Use Policy (AUP)
  • Integrate auditing and accounting into your security policy
  • Configure the IP Security Architecture (IPsec)
  • Utilize open source security tools in your security plan
  • Configure and deploy Kerberos 5, Role-Based Access Control (RBAC), and authentication and authorization
Contents
  • Preface
  • 1: Enterprise Security Framework
  • 2: Security and Cryptography
  • 3: System Security
  • 4: Authentication and Authorization
  • 5: Kerberos
  • 6: Auditing and Accounting
  • 7: Open Source Security Tools
  • 8: Network Security
  • 9: IP Security Architecture (IPsec)
  • 10: Securing Network Services
  • A: Internet Protocols
  • B: TCP and UDP Port Numbers
  • C: Solaris 8 Standards Conformance
  • D: Types of Attacks and Vulnerabilities
  • E: System and Network Security Checklist
  • F: Security Resources
  • G: Trusted Solaris 8
  • H: SunScreen 3.1 Lite
  • Glossary
  • Index

Caractéristiques techniques

  PAPIER
Éditeur(s) New Riders
Auteur(s) Edgar Danielyan
Parution 05/02/2002
Nb. de pages 274
Format 17,6 x 22,8
Couverture Broché
Poids 468g
Intérieur Noir et Blanc
EAN13 9781578702701

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription