Résumé
- Thorough coverage of HP-UX 11i's powerful new host security features
- Monitoring system access, activity, and change
- 10 ways to gain root access-what every system administrator needs to know
- Implementing Kerberos, PAM, IPSec, SCM, SCR, and IDS/9000
No other book offers this much HP-UX-specific security coverage! In this authoritative, comprehensive administrator's guide, leading HP-UX consultant Chris Wong covers every key aspect of HP-UX host security. Wong introduces "hot-off-the-press" HP-UX 11i capabilities and techniques for keeping mission-critical systems safe-even when firewalls fail and backdoors are discovered. Coverage includes:
- Understanding and addressing your key vulnerabilities
- 10 ways to gain root access-and what to do about them
- Managing users, groups, files, and directories from a security perspective
- Controlling access to the system and securing key services
- Safely distributing root privileges
- Using HP-UX software to enhance system security: SCM, SCR, Restricted SAM, IDS/9000, and the Security Patch Check Tool
- Security techniques for the multi-host environment: Berkeley programs, SSH, NIS, NIS+, LDAP, Kerberos, PAM, and IPSec/9000
- Tools and techniques for monitoring system activity and change
- Using public-domain programs: SARA, Tripwire, sudo, and logrotate
HP-UX 11i Security is the essential security resource for every HP-UX system administrator, from novice to advanced level—and for every consultant, manager,specialist, and e-business professional responsible for protecting HP-UX applications and data.
Table of Contents
Foreword.
Preface.
1. Ready or Not, Here I Come! @AHEADS= Attacks. What Is
Needed to Compromise a System? Ten Ways To Become root.
What Can Happen When the System Is Compromised? Protection.
A Letter to the CIO. Policies.
2. Passwords, Users, and Groups.
3. Disks, File Systems, and Permissions.
4. System Access.
5. Multi-Host Environments.
6. Distributing root Privileges.
7. ServiceControl Manager.
8. Internet Daemon Services.
9. Kerberos.
10. IPSec/9000.
11. Monitoring System Activity.
12. Monitoring System Changes.
13. NetAction.
14. Building a Bastion Host by Kevin Steves.
15. Checklist, Security Patches, and Miscellaneous Topics.
Index.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Prentice Hall |
Auteur(s) | Chris Wrong |
Parution | 06/11/2001 |
Nb. de pages | 458 |
Format | 17,8 x 23,5 |
Couverture | Broché |
Poids | 920g |
Intérieur | Noir et Blanc |
EAN13 | 9780130330628 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse