Protecting corporate assets from security breaches is a compelling concern an organization’s productivity, brand reputation and consumer confidence can all depend on it. Implementing proper information security measures is also the first step towards minimizing production down time due to system failure - one of the primary goals of every organization.During the author’s extensive experience as a system and security administrator for numerous large and medium-size companies, it was not unusual for operation and production management to prohibit the installation of any third-party applications - “unsupported” freeware and open-source applications for hardening security, especially on production machines. This was partially due to strict policies from vendors providing operating system support. It was also because of company security policies prohibiting downloading from the Internet and installing any applications that have not been thoroughly tested, regardless of how well these applications can secure the production box. Therefore, in many cases you will not be able to use any third-party tools.This book was written to help system and security administrators set up a secure UNIX operating system environment by using the native capabilities of the “pure” operating system. As you read this book, you will learn that with your knowledge of the operating system and information security, it is possible to do a great deal to create a “hard” operating environment by using only the tools and utilities that come bundled with UNIX.This book not only discusses security measures, but actually shows you how particular measures can be implemented. Use it when you need a practical solution for a security problem.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
EUR 17,18 expédition depuis Etats-Unis vers France
Destinations, frais et délaisEUR 6,03 expédition depuis Royaume-Uni vers France
Destinations, frais et délaisVendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
Paperback / softback. Etat : New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 372. N° de réf. du vendeur C9780973614701
Quantité disponible : Plus de 20 disponibles
Vendeur : BargainBookStores, Grand Rapids, MI, Etats-Unis
Paperback or Softback. Etat : New. Unix: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications 0.82. Book. N° de réf. du vendeur BBS-9780973614701
Quantité disponible : 5 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 36054356-n
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 36054356
Quantité disponible : Plus de 20 disponibles
Vendeur : moluna, Greven, Allemagne
Etat : New. N° de réf. du vendeur 899018753
Quantité disponible : Plus de 20 disponibles
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. Neuware - Protecting corporate assets from security breaches is a compelling concern an organization's productivity, brand reputation and consumer confidence can all depend on it. Implementing proper information security measures is also the first step towards minimizing production down time due to system failure - one of the primary goals of every organization.During the author's extensive experience as a system and security administrator for numerous large and medium-size companies, it was not unusual for operation and production management to prohibit the installation of any third-party applications - 'unsupported' freeware and open-source applications for hardening security, especially on production machines. This was partially due to strict policies from vendors providing operating system support. It was also because of company security policies prohibiting downloading from the Internet and installing any applications that have not been thoroughly tested, regardless of how well these applications can secure the production box. Therefore, in many cases you will not be able to use any third-party tools.This book was written to help system and security administrators set up a secure UNIX operating system environment by using the native capabilities of the 'pure' operating system. As you read this book, you will learn that with your knowledge of the operating system and information security, it is possible to do a great deal to create a 'hard' operating environment by using only the tools and utilities that come bundled with UNIX.This book not only discusses security measures, but actually shows you how particular measures can be implemented. Use it when you need a practical solution for a security problem. N° de réf. du vendeur 9780973614701
Quantité disponible : 2 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 36054356-n
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 36054356
Quantité disponible : Plus de 20 disponibles
Vendeur : Best Price, Torrance, CA, Etats-Unis
Etat : New. SUPER FAST SHIPPING. N° de réf. du vendeur 9780973614701
Quantité disponible : 2 disponible(s)