Protecting corporate assets from security breaches is a compelling concern an organization’s productivity, brand reputation and consumer confidence can all depend on it. Implementing proper information security measures is also the first step towards minimizing production down time due to system failure - one of the primary goals of every organization.During the author’s extensive experience as a system and security administrator for numerous large and medium-size companies, it was not unusual for operation and production management to prohibit the installation of any third-party applications - “unsupported” freeware and open-source applications for hardening security, especially on production machines. This was partially due to strict policies from vendors providing operating system support. It was also because of company security policies prohibiting downloading from the Internet and installing any applications that have not been thoroughly tested, regardless of how well these applications can secure the production box. Therefore, in many cases you will not be able to use any third-party tools.This book was written to help system and security administrators set up a secure UNIX operating system environment by using the native capabilities of the “pure” operating system. As you read this book, you will learn that with your knowledge of the operating system and information security, it is possible to do a great deal to create a “hard” operating environment by using only the tools and utilities that come bundled with UNIX.This book not only discusses security measures, but actually shows you how particular measures can be implemented. Use it when you need a practical solution for a security problem.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
EUR 17,14 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 11,57 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Unix: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications 0.82. Book. Codice articolo BBS-9780973614701
Quantità: 5 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 372. Codice articolo C9780973614701
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 36054356-n
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition. Codice articolo 36054356
Quantità: Più di 20 disponibili
Da: moluna, Greven, Germania
Condizione: New. Codice articolo 899018753
Quantità: Più di 20 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: New. Codice articolo 36054356-n
Quantità: Più di 20 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: As New. Unread book in perfect condition. Codice articolo 36054356
Quantità: Più di 20 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Neuware - Protecting corporate assets from security breaches is a compelling concern an organization's productivity, brand reputation and consumer confidence can all depend on it. Implementing proper information security measures is also the first step towards minimizing production down time due to system failure - one of the primary goals of every organization.During the author's extensive experience as a system and security administrator for numerous large and medium-size companies, it was not unusual for operation and production management to prohibit the installation of any third-party applications - 'unsupported' freeware and open-source applications for hardening security, especially on production machines. This was partially due to strict policies from vendors providing operating system support. It was also because of company security policies prohibiting downloading from the Internet and installing any applications that have not been thoroughly tested, regardless of how well these applications can secure the production box. Therefore, in many cases you will not be able to use any third-party tools.This book was written to help system and security administrators set up a secure UNIX operating system environment by using the native capabilities of the 'pure' operating system. As you read this book, you will learn that with your knowledge of the operating system and information security, it is possible to do a great deal to create a 'hard' operating environment by using only the tools and utilities that come bundled with UNIX.This book not only discusses security measures, but actually shows you how particular measures can be implemented. Use it when you need a practical solution for a security problem. Codice articolo 9780973614701
Quantità: 2 disponibili
Da: Best Price, Torrance, CA, U.S.A.
Condizione: New. SUPER FAST SHIPPING. Codice articolo 9780973614701
Quantità: 1 disponibili