Solarisac 10 Security Essentials describes the various security technologies contained in the Solaris operating system. The book describes how to make installations secure and how to configure the OS to the particular needs of your environment, whether your systems are on the edge of the Internet or running a data center. The authors present the material in a straightforward way that makes a seemingly arcane subject accessible to system administrators at all levels. The strengths of the Solaris operating systemas security model are its scalability and its adaptability. It can protect a single user with login authentication or multiple users with Internet and intranet configurations requiring user-rights management, authentication, encryption, IP security, key management, and more. This book is written for users who need to secure their laptops, network administrators who must secure an entire company, and everyone in between. The bookas topics include Zones virtualization security System hardening Trusted Extensions (Multi-layered Security) Privileges and role-based access control (RBAC) Cryptographic services and key management Auditing Network security Pluggable Authentication Modules (PAM) Solarisac 10 Security Essentials is the first in a new series on Solaris system administration. It is a superb guide to deploying and managing secure computer environments.Some suggestions are given below. The chapter titled aRoles, Rights Profiles, and Privilegesa from the System Administration Guide (Solaris 10 System Administration Collection) Sun Blueprints on privileges: Limiting Services in the Solaris 10anbsp;...
Title | : | Solaris 10 Security Essentials |
Author | : | Sun Microsystems Security Engineers |
Publisher | : | Pearson Education - 2009-11-09 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: