Protecting corporate assets from security breaches is a compelling concern an organization’s productivity, brand reputation and consumer confidence can all depend on it. Implementing proper information security measures is also the first step towards minimizing production down time due to system failure - one of the primary goals of every organization.During the author’s extensive experience as a system and security administrator for numerous large and medium-size companies, it was not unusual for operation and production management to prohibit the installation of any third-party applications - “unsupported” freeware and open-source applications for hardening security, especially on production machines. This was partially due to strict policies from vendors providing operating system support. It was also because of company security policies prohibiting downloading from the Internet and installing any applications that have not been thoroughly tested, regardless of how well these applications can secure the production box. Therefore, in many cases you will not be able to use any third-party tools.This book was written to help system and security administrators set up a secure UNIX operating system environment by using the native capabilities of the “pure” operating system. As you read this book, you will learn that with your knowledge of the operating system and information security, it is possible to do a great deal to create a “hard” operating environment by using only the tools and utilities that come bundled with UNIX.This book not only discusses security measures, but actually shows you how particular measures can be implemented. Use it when you need a practical solution for a security problem.
"synopsis" may belong to another edition of this title.
US$ 2.64 shipping within U.S.A.
Destination, rates & speedsSeller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 36054356-n
Quantity: Over 20 available
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Unix: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications 0.82. Book. Seller Inventory # BBS-9780973614701
Quantity: 5 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 36054356
Quantity: Over 20 available
Seller: Best Price, Torrance, CA, U.S.A.
Condition: New. SUPER FAST SHIPPING. Seller Inventory # 9780973614701
Quantity: 2 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 372. Seller Inventory # C9780973614701
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 36054356-n
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 36054356
Quantity: Over 20 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Neuware - Protecting corporate assets from security breaches is a compelling concern an organization's productivity, brand reputation and consumer confidence can all depend on it. Implementing proper information security measures is also the first step towards minimizing production down time due to system failure - one of the primary goals of every organization.During the author's extensive experience as a system and security administrator for numerous large and medium-size companies, it was not unusual for operation and production management to prohibit the installation of any third-party applications - 'unsupported' freeware and open-source applications for hardening security, especially on production machines. This was partially due to strict policies from vendors providing operating system support. It was also because of company security policies prohibiting downloading from the Internet and installing any applications that have not been thoroughly tested, regardless of how well these applications can secure the production box. Therefore, in many cases you will not be able to use any third-party tools.This book was written to help system and security administrators set up a secure UNIX operating system environment by using the native capabilities of the 'pure' operating system. As you read this book, you will learn that with your knowledge of the operating system and information security, it is possible to do a great deal to create a 'hard' operating environment by using only the tools and utilities that come bundled with UNIX.This book not only discusses security measures, but actually shows you how particular measures can be implemented. Use it when you need a practical solution for a security problem. Seller Inventory # 9780973614701
Quantity: 2 available
Seller: moluna, Greven, Germany
Condition: New. Seller Inventory # 899018753
Quantity: Over 20 available