Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Sun Solaris 8

Buy
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors of Hack Proofing Sun Solaris 8 teach you how to run Solaris with flair. They show you how to implement wise security rules and implement popular services--like Common Gateway Interface (CGI) scripts--with a focus on improving security without reducing function. Most of the advice here has to do with Solaris boxes as Web servers, mail servers, and firewalls.

A lot of the authors' advice will be familiar to readers who have done security work before--their advice to disable all nonessential services, for example, falls into this category. Other information, such as the particular syntax of Solaris's native security utilities and third-party programs that are designed for Solaris, is very handy. It'll prove especially nice for people coming to Solaris from security administration on other operating systems. The organizational approach balances quick reference--the ability to quickly locate some detail via the index--with informative background that will help you head off emerging, undocumented attacks. There aren't many earth-shaking revelations in this book, but it contains good documentation of Solaris security tools and procedures.
--David Wall

Topics covered: Sun Solaris 8 defensive policies and procedures. Native Solaris tools (like audit log) are documented, as are outside tools like Snort. There's advice on setting user and file permissions, and hints on how to configure network services like HTTP, SMTP, DHCP, and network address translation (NAT) in a secure way. Caching with Squid gets attention, too.

Sun Microsystems has spent a great deal of effort in designing Solaris to be both stable and secure. This book is a definitive reference guide for not only securing a Solaris systems, but also for securing the environment in which they operate.

Written for system administrators and security professionals concerned with protecting their Sun Solaris operating system. Covers everything from the motivation of a hacker to the tools and techniques that hackers use. Softcover.

About the Author
Hal Flynn is a Threat Analyst at SecurityFocus, the leading provider of Security Intelligence Services for Business. Hal functions as a Senior Analyst, performing research and analysis of vulnerabilities, malicious code, and network attacks. He provides the SecurityFocus team with UNIX and Network expertise. He is also the manager of the UNIX Focus Area and moderator of the Focus-Sun, Focus-Linux, Focus-BSD, and Focus-GeneralUnix mailing lists. Hal has worked the field in jobs as varied as the Senior Systems and Network Administrator of an Internet Service Provider, to contracting the United States Defense Information Systems Agency, to Enterprise-level consulting for Sprint. He is also a proud veteran of the United States Navy Hospital Corps, having served a tour with the 2nd Marine Division at Camp Lejeune, NC as a Fleet Marine Force Corpsman. Hal is mobile, living between sunny Phoenix, AZ and wintry Calgary, Alberta, Canada. Rooted in the South, he currently calls Montgomery, AL home.

Drew Simonis (CCNA, SCSA, SCNA, CCSA, CCSE, IBM CS) is co-author of Hack Proofing Your Web Applications (ISBN: 1-928994-31-8) and is a Senior Security Engineer with the RL Phillips Group, LLC. He currently provides senior level security consulting to the United States Navy, working on large enterprise networks. He considers himself a security generalist, with a strong background in system administration, Internet application development, intrusion detection and prevention and penetration testing. Drew’s background includes a consulting position with Fiderus, serving as a Security Architect with AT&T and as a Technical Team Lead with IBM. Drew has a bachelor’s degree from the University of South Florida and is also a member of American MENSA. Drew currently lives in Suffolk, VA with his wife Kym and daughters Cailyn and Delaney.

(HTML tags aren't allowed.)

Beginning XML with DOM and Ajax: From Novice to Professional
Beginning XML with DOM and Ajax: From Novice to Professional
This books aims to provide a “one-stop shop” for developers who want to learn how to build Extensible Markup Language (XML) web applications. It explains XML and its role in the web development world. The book also introduces specific XML vocabularies and related XML recommendations.

I wrote the book for web developers at all
...
Radiochemistry and Nuclear Chemistry, Fourth Edition
Radiochemistry and Nuclear Chemistry, Fourth Edition

Radiochemistry or nuclear chemistry is the study of radiation from an atomic and molecular perspective, including elemental transformation and reaction effects, as well as physical, health and medical properties.

This revised edition of one of the earliest and best-known books on the subject has been updated to bring into teaching...

Shadows of War: Violence, Power, and International Profiteering in the Twenty-First Century (California Series in Public Anthropology, 10)
Shadows of War: Violence, Power, and International Profiteering in the Twenty-First Century (California Series in Public Anthropology, 10)
"This should be made into a movie!"-Katia Lund, Co-director of City of God "Carolyn Nordstrom destroys the categories through which we normally look at war. This is a major achievement. Her eyewitness reporting, when contrasted with the official histories later compiled of the same events, is a revelation. The amount of...

Frommer's Florence and Tuscany Day by Day (Frommer's Day by Day - Pocket)
Frommer's Florence and Tuscany Day by Day (Frommer's Day by Day - Pocket)

28 Self-guided Tours. 34 Maps. One Great Trip.

At last, a travel guide that tells you how to see the best of everything—in the smartest, most time-efficient way.

  • The best of Florence & Tuscany in one, two, or three days
  • Thematic tours for every interest, schedule, and taste...

Mixed Reality and Human-Robot Interaction (Intelligent Systems, Control and Automation: Science and Engineering)
Mixed Reality and Human-Robot Interaction (Intelligent Systems, Control and Automation: Science and Engineering)

MR technologies play an increasing role in different aspects of human-robot interactions. The visual combination of digital contents with real working spaces creates a simulated environment that is set out to enhance these aspects. This book presents and discusses fundamental scientific issues, technical implementations, lab testing, and...

MCAD/MCSD Self-Paced Training Kit: Developing Web Applications with Microsoft Visual Basic .NET and Microsoft Visual C# .NET
MCAD/MCSD Self-Paced Training Kit: Developing Web Applications with Microsoft Visual Basic .NET and Microsoft Visual C# .NET

Welcome to MCAD/MCSD Training Kit—Developing Web Applications with Microsoft Visual Basic .NET and Microsoft Visual C# .NET. By completing the lessons and exercises in this book, you will acquire the skills and knowledge necessary to develop Web-based applications in ...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy