HP-UX 11i Security
- 出版商: Prentice Hall
- 出版日期: 2001-10-04
- 售價: $299
- 語言: 英文
- 頁數: 480
- 裝訂: Paperback
- ISBN: 0130330620
- ISBN-13: 9780130330628
貴賓價: $1,792The HP-UX 11.x System Administration Handbook and Toolkit, 2/e
The total HP-UX 11i security reference and implementation guide
- Thorough coverage of HP-UX 11i's powerful new host security features
- Monitoring system access, activity, and change
- 10 ways to gain root access-what every system administrator needs to know
- Implementing Kerberos, PAM, IPSec, SCM, SCR, and IDS/9000
No other book offers this much HP-UX-specific security coverage! In this authoritative, comprehensive administrator's guide, leading HP-UX consultant Chris Wong covers every key aspect of HP-UX host security. Wong introduces "hot-off-the-press" HP-UX 11i capabilities and techniques for keeping mission-critical systems safe-even when firewalls fail and backdoors are discovered. Coverage includes:
- Understanding and addressing your key vulnerabilities
- 10 ways to gain root access-and what to do about them
- Managing users, groups, files, and directories from a security perspective
- Controlling access to the system and securing key services
- Safely distributing root privileges
- Using HP-UX software to enhance system security: SCM, SCR, Restricted SAM, IDS/9000, and the Security Patch Check Tool
- Security techniques for the multi-host environment: Berkeley programs, SSH, NIS, NIS+, LDAP, Kerberos, PAM, and IPSec/9000
- Tools and techniques for monitoring system activity and change
- Using public-domain programs: SARA, Tripwire, sudo, and logrotate
HP-UX 11i Security is the essential security resource for every HP-UX system administrator, from novice to advanced level—and for every consultant, manager, security specialist, and e-business professional responsible for protecting HP-UX applications and data.
1. Ready or Not, Here I Come! @AHEADS= Attacks. What Is Needed to Compromise a System? Ten Ways To Become root. What Can Happen When the System Is Compromised? Protection. A Letter to the CIO. Policies.
2. Passwords, Users, and Groups.
3. Disks, File Systems, and Permissions.
4. System Access.
5. Multi-Host Environments.
6. Distributing root Privileges.
7. ServiceControl Manager.
8. Internet Daemon Services.
11. Monitoring System Activity.
12. Monitoring System Changes.
14. Building a Bastion Host by Kevin Steves.
15. Checklist, Security Patches, and Miscellaneous Topics.