This text discusses the preventive methods designed to help systems personnel to avoid potential security leaks when using the AS/400 as a server. The text is practical, focusing on recovery strategies, and case studies illustrate various scenarios. The accompanying disk contains a variety of security auditing and anti-virus programs, which will provide the reader with ready-to-use programs so they can create their own secure methods.
"Sinopsis" puede pertenecer a otra edición de este libro.
" The Author, in considerable detail, shows the various vulnerabilities of the AS/400 system, and also indicates various approaches to their cure. Through examples and case studies that read like detective stories, this book explains why the AS/400 represents such a tempting target to hackers, bugs and virus. If you are involved with an IBM AS/400 system used as a server, this book is for you." -- George McGinnis; Cryptolog; Vol. 22; No. 1; Winter 2001
This text discusses the preventive methods designed to help systems personnel to avoid potential security leaks when using the AS/400 as a server. The text is practical, focusing on recovery strategies, and case studies illustrate various scenarios. The accompanying disk contains a variety of security auditing and anti-virus programs, which will provide the reader with ready-to-use programs so they can create their own secure methods.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 21,89 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: Bookmans, Tucson, AZ, Estados Unidos de America
Hardcover. Condición: Acceptable. Some light wear. Includes diskette. Satisfaction 100% guaranteed. Nº de ref. del artículo: mon0002021875
Cantidad disponible: 1 disponibles