Xem 1-11 trên 11 kết quả Solaris security
  • Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box", operating system capabilities to secure your UNIX environment. No need for third-party software or freeware tools to be and stay secure! This book will help you ensure that your system is protected from unauthorized users and conduct intrusion traces to identify the intruders if this does occur. It provides you with practical information to use of the native OS security capabilities without the need for a third party security software application....

    pdf44p samsung_12 07-05-2013 15 3   Download

  • Default installations of almost any operating system are prime targets for hackers, and Solaris is no exception.These installations are usually devoid of any vendor patches, may be running system daemons with more privilege than necessary, and are likely to use insecure protocols.This chapter is designed to get you to begin thinking about Solaris in terms of security by examining the shortcomings of the default Solaris installation, as well as the tools available for monitoring the system. Most intrusions will result in your Solaris systems displaying uncharacteristic...

    pdf428p tailieuvip13 19-07-2012 31 11   Download

  • Tham khảo sách 'mcse, ccna, ccnp, ocp, ciw, java, sun solaris, checkpoint world no1 cert guides: composite exam exam 642-891 edition 2.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf196p duypha 10-08-2009 112 22   Download

  • The Secure Shell It is a protocol not a product Software based approach to network security Encrypts the data sent between the computers Client/Server architecture Comes with all Linux distribution, Mac OS X, AIX, Sun Solaris, OpenBSD and other Unix variants Ported to other operating systems, such as Windows, Palm OS, Amiga, etc. Other clients, such as, scp, sftp, etc. are also available Replacement for telnet, rlogin, rsh, rcp, ftp, etc.

    pdf84p trung254 04-11-2012 41 10   Download

  • Oracle Solaris provides innovative, built-in features that deliver breakthrough high availability, advanced security, efficiency, and industry-leading scalability and performance to help businesses grow. "Oracle Solaris 11: First Look" covers the new features and functionality of Oracle Solaris 11 and how these new features and improvements will make it easier to deploy services to the enterprise while improving performance and reducing total cost of ownership.

    pdf168p titatu_123 09-03-2013 32 7   Download

  • Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases)...

    pdf744p hoa_can 05-02-2013 27 5   Download

  • Brian E. Brzezicki email: brianb@paladingrp.com Bachelor of Science, Computer Science Masters of Science, Computer Science ISC2 CISSP EC-Council Certified Ethical Hacker (CEH) CompTIA Security+ Red Hat Certified Technician (RHCT), Certified Engineer (RHCE) Sun Solaris Network Administrator, Sun Solaris Systems Administrator Microsoft MCSE (NT 4.0) / Microsoft Certified Trainer

    ppt8p doilan 25-01-2013 30 4   Download

  • Unauthorized access is when an unauthorized entity gains access to an asset and has the possibility to tamper with that asset. Gaining access is usually the result of intercepting some information in transit over an insecure channel or exploiting an inherent weakness in a technology or a product. Getting access to corporate network resources is usually accomplished by doing some reconnaissance work. Most likely, the corporate network will be accessed through the Internet, tapping into the physical wire, remote modem dial-in access, or wireless network access.

    pdf174p cao_can 02-01-2013 17 3   Download

  • What does a typical BCS network look like? Most installations today have a dedicated BCS network with centralized control via an operator’s terminal in the facility manager’s office. There is no Internet (or LAN) connection, and thus no IT threat. However, the trend today is toward greater connectivity to enable new services, convenience, and savings on infrastructure costs. Newer buildings have network connections to the Inter- net. But even so, most BCS networks still have few resources that are of value to the typical “hacker”. ...

    pdf28p khongmuonnghe 04-01-2013 23 3   Download

  • Linux is a member of the large family of Unix-like operating systems. A relative newcomer experiencing sudden spectacular popularity starting in the late 1990s, Linux joins such wellknown commercial Unix operating systems as System V Release 4 (SVR4), developed by AT&T (now owned by the SCO Group); the 4.4 BSD release from the University of California at Berkeley (4.4BSD); Digital Unix from Digital Equipment Corporation (now Hewlett- Packard); AIX from IBM; HP-UX from Hewlett-Packard; Solaris from Sun Microsystems; and Mac OS X from Apple Computer, Inc....

    pdf829p vinhnghi 17-08-2009 137 87   Download

  • UNIX Administration: A Comprehensive Sourcebook for Effective Systems & Network Management is a one-stop handbook for the administration and maintenance of UNIX systems and networks. With an outstanding balance of concepts and practical matters, it covers the entire range of administrative tasks, from the most basic to the advanced, from system startup and shutdown to network security and kernel reconfiguration. While focusing on the primary UNIX platforms, the author discusses all of the most common UNIX “flavors,” including Solaris, Linux, HP-UX, AIX and SGI IRIX.

    pdf725p samsung_12 07-05-2013 19 3   Download

Đồng bộ tài khoản