Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Sun Solaris 8

Buy
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors of Hack Proofing Sun Solaris 8 teach you how to run Solaris with flair. They show you how to implement wise security rules and implement popular services--like Common Gateway Interface (CGI) scripts--with a focus on improving security without reducing function. Most of the advice here has to do with Solaris boxes as Web servers, mail servers, and firewalls.

A lot of the authors' advice will be familiar to readers who have done security work before--their advice to disable all nonessential services, for example, falls into this category. Other information, such as the particular syntax of Solaris's native security utilities and third-party programs that are designed for Solaris, is very handy. It'll prove especially nice for people coming to Solaris from security administration on other operating systems. The organizational approach balances quick reference--the ability to quickly locate some detail via the index--with informative background that will help you head off emerging, undocumented attacks. There aren't many earth-shaking revelations in this book, but it contains good documentation of Solaris security tools and procedures.
--David Wall

Topics covered: Sun Solaris 8 defensive policies and procedures. Native Solaris tools (like audit log) are documented, as are outside tools like Snort. There's advice on setting user and file permissions, and hints on how to configure network services like HTTP, SMTP, DHCP, and network address translation (NAT) in a secure way. Caching with Squid gets attention, too.

Sun Microsystems has spent a great deal of effort in designing Solaris to be both stable and secure. This book is a definitive reference guide for not only securing a Solaris systems, but also for securing the environment in which they operate.

Written for system administrators and security professionals concerned with protecting their Sun Solaris operating system. Covers everything from the motivation of a hacker to the tools and techniques that hackers use. Softcover.

About the Author
Hal Flynn is a Threat Analyst at SecurityFocus, the leading provider of Security Intelligence Services for Business. Hal functions as a Senior Analyst, performing research and analysis of vulnerabilities, malicious code, and network attacks. He provides the SecurityFocus team with UNIX and Network expertise. He is also the manager of the UNIX Focus Area and moderator of the Focus-Sun, Focus-Linux, Focus-BSD, and Focus-GeneralUnix mailing lists. Hal has worked the field in jobs as varied as the Senior Systems and Network Administrator of an Internet Service Provider, to contracting the United States Defense Information Systems Agency, to Enterprise-level consulting for Sprint. He is also a proud veteran of the United States Navy Hospital Corps, having served a tour with the 2nd Marine Division at Camp Lejeune, NC as a Fleet Marine Force Corpsman. Hal is mobile, living between sunny Phoenix, AZ and wintry Calgary, Alberta, Canada. Rooted in the South, he currently calls Montgomery, AL home.

Drew Simonis (CCNA, SCSA, SCNA, CCSA, CCSE, IBM CS) is co-author of Hack Proofing Your Web Applications (ISBN: 1-928994-31-8) and is a Senior Security Engineer with the RL Phillips Group, LLC. He currently provides senior level security consulting to the United States Navy, working on large enterprise networks. He considers himself a security generalist, with a strong background in system administration, Internet application development, intrusion detection and prevention and penetration testing. Drew’s background includes a consulting position with Fiderus, serving as a Security Architect with AT&T and as a Technical Team Lead with IBM. Drew has a bachelor’s degree from the University of South Florida and is also a member of American MENSA. Drew currently lives in Suffolk, VA with his wife Kym and daughters Cailyn and Delaney.

(HTML tags aren't allowed.)

Mathematical Foundations of Computer Science 2013: 38th International Symposium, MFCS 2013, Klosterneuburg, Austria, August 26-30, 2013, Proceedings
Mathematical Foundations of Computer Science 2013: 38th International Symposium, MFCS 2013, Klosterneuburg, Austria, August 26-30, 2013, Proceedings

This book constitutes the thoroughly refereed conference proceedings of the 38th International Symposium on Mathematical Foundations of Computer Science, MFCS 2013, held in Klosterneuburg, Austria, in August 2013. The 67 revised full papers presented together with six invited talks were carefully selected from 191 submissions. Topics covered...

Flash Game Development by Example
Flash Game Development by Example

With the Flash games market in continuous expansion, it's no surprise more and more developers are putting their efforts into the creation of Flash games. Anyway, what makes Flash games development different from other kinds of casual game development is the budget required to make it a commercial success.

There are a lot of...

An Introduction to the Analysis of Algorithms (2nd Edition)
An Introduction to the Analysis of Algorithms (2nd Edition)

Despite growing interest, basic information on methods and models for mathematically analyzing algorithms has rarely been directly accessible to practitioners, researchers, or students. An Introduction to the Analysis of Algorithms, Second Edition, organizes and presents that knowledge, fully...


The Cichlids Yearbook Volume 1 (1)
The Cichlids Yearbook Volume 1 (1)

Fascination with cichlids has taken many aquarists to the point where they go and observe these wonderful fishes in the natural habitat. The hunger for more knowledge about the cichlids’ behavior and distribution, and especially for more new species has led to the introduction of an overwhelming array of previously unknown species and...

Excel 2010 Just the Steps For Dummies
Excel 2010 Just the Steps For Dummies

Welcome to the world of Microsoft Excel, the most popular and powerful spreadsheet program in the world. You may ask: “What is a spreadsheet program?” A spreadsheet program is a computer program that features a huge grid designed to display data in rows and columns. You can use it to perform mathematical, logical, and other types...

Female Pelvic Medicine and Reconstructive Pelvic Surgery
Female Pelvic Medicine and Reconstructive Pelvic Surgery

This text includes sections on anatomy, normal and abnormal physiology, investigation techniques, inflammatory conditions and treatment options. The international panel of contributors is at the forefront of research in the field; the editors have assembled these contributors and topics that span the entire range of pelvic floor disorders in...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy