This hands-on tutorial for UNIX users and programmers provides in-depth information on how to protect UNIX-based computers systems from unauthorized users and destructive data manipulation. The guide includes all the essential tools and techniques to manage and control security in a UNIX system. Practical coverage includes: information control and the effective use of the UNIX file system permissions; the UNIX boot path; audit programs and special files; UNIX commands to watch out for; securing incoming modems; and special considerations dealing with networks.
"Sinopsis" puede pertenecer a otra edición de este libro.
This hands-on tutorial for UNIX users and programmers provides in-depth information on how to protect UNIX-based computers systems from unauthorized users and destructive data manipulation. The guide includes all the essential tools and techniques to manage and control security in a UNIX system. Practical coverage includes: information control and the effective use of the UNIX file system permissions; the UNIX boot path; audit programs and special files; UNIX commands to watch out for; securing incoming modems; and special considerations dealing with networks.
"Sobre este título" puede pertenecer a otra edición de este libro.
(Ningún ejemplar disponible)
Buscar: Crear una petición¿No encuentra el libro que está buscando? Seguiremos buscando por usted. Si alguno de nuestros vendedores lo incluye en IberLibro, le avisaremos.
Crear una petición