Hack proofing Sun Solaris 8
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
©2001
|
Schlagworte: | |
Online-Zugang: | DE-1046 DE-1047 Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043155176 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2001 xx o|||| 00||| eng d | ||
020 | |a 192899444X |9 1-928994-44-X | ||
020 | |a 193226616X |9 1-932266-16-X | ||
020 | |a 9781928994442 |9 978-1-928994-44-2 | ||
020 | |a 9781932266160 |9 978-1-932266-16-0 | ||
035 | |a (OCoLC)51671136 | ||
035 | |a (DE-599)BVBBV043155176 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Miles, Wyman |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hack proofing Sun Solaris 8 |c Wyman Miles, Ed Mitchell, F. William Lynch ; Randy Cook, technical editor |
246 | 1 | 3 | |a Hack proofing Sun Solaris eight |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c ©2001 | |
300 | |a 1 Online-Ressource (xxiii, 407 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Introducting Solaris security -- Securing Solaris with the bundled security tools -- Securing Solaris with freeware security tools -- Securing your users -- Securing your files -- Securing your network -- Providing secure web and mail services -- Configuring Solaris as a secure router and firewall -- Using squid on Solaris -- Dissecting hacks -- Detecting and denying hacks -- Hack proofing Sun Solaris 8 fast track -- Index | ||
500 | |a The only way to stop a hacker is to think like one! Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers. The fifth title in the popular series that brought us the bestseller Hack Proofing Your Network Teaches strategy and techniques using forensic-based analysis Up to the minute Web-based support with solutions@syngress.com | ||
630 | 0 | 4 | |a Solaris (Computer file) |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Solaris (Computer file) |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Mitchell, Ed |e Sonstige |4 oth | |
700 | 1 | |a Lynch, F. William |e Sonstige |4 oth | |
700 | 1 | |a Cook, Randy |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75888 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028579367 | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75888 |l DE-1046 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75888 |l DE-1047 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1819295520604028928 |
---|---|
any_adam_object | |
author | Miles, Wyman |
author_facet | Miles, Wyman |
author_role | aut |
author_sort | Miles, Wyman |
author_variant | w m wm |
building | Verbundindex |
bvnumber | BV043155176 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)51671136 (DE-599)BVBBV043155176 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03587nam a2200541zc 4500</leader><controlfield tag="001">BV043155176</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2001 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">192899444X</subfield><subfield code="9">1-928994-44-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">193226616X</subfield><subfield code="9">1-932266-16-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781928994442</subfield><subfield code="9">978-1-928994-44-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266160</subfield><subfield code="9">978-1-932266-16-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51671136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043155176</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Miles, Wyman</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hack proofing Sun Solaris 8</subfield><subfield code="c">Wyman Miles, Ed Mitchell, F. William Lynch ; Randy Cook, technical editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hack proofing Sun Solaris eight</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiii, 407 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introducting Solaris security -- Securing Solaris with the bundled security tools -- Securing Solaris with freeware security tools -- Securing your users -- Securing your files -- Securing your network -- Providing secure web and mail services -- Configuring Solaris as a secure router and firewall -- Using squid on Solaris -- Dissecting hacks -- Detecting and denying hacks -- Hack proofing Sun Solaris 8 fast track -- Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The only way to stop a hacker is to think like one! Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers. The fifth title in the popular series that brought us the bestseller Hack Proofing Your Network Teaches strategy and techniques using forensic-based analysis Up to the minute Web-based support with solutions@syngress.com</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Solaris (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Solaris (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mitchell, Ed</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lynch, F. William</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cook, Randy</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75888</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028579367</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75888</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75888</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043155176 |
illustrated | Not Illustrated |
indexdate | 2024-12-24T04:43:31Z |
institution | BVB |
isbn | 192899444X 193226616X 9781928994442 9781932266160 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028579367 |
oclc_num | 51671136 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxiii, 407 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Miles, Wyman Verfasser aut Hack proofing Sun Solaris 8 Wyman Miles, Ed Mitchell, F. William Lynch ; Randy Cook, technical editor Hack proofing Sun Solaris eight Rockland, MA Syngress Pub. ©2001 1 Online-Ressource (xxiii, 407 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Introducting Solaris security -- Securing Solaris with the bundled security tools -- Securing Solaris with freeware security tools -- Securing your users -- Securing your files -- Securing your network -- Providing secure web and mail services -- Configuring Solaris as a secure router and firewall -- Using squid on Solaris -- Dissecting hacks -- Detecting and denying hacks -- Hack proofing Sun Solaris 8 fast track -- Index The only way to stop a hacker is to think like one! Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers. The fifth title in the popular series that brought us the bestseller Hack Proofing Your Network Teaches strategy and techniques using forensic-based analysis Up to the minute Web-based support with solutions@syngress.com Solaris (Computer file) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Solaris (Computer file) fast Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures Mitchell, Ed Sonstige oth Lynch, F. William Sonstige oth Cook, Randy Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75888 Aggregator Volltext |
spellingShingle | Miles, Wyman Hack proofing Sun Solaris 8 Solaris (Computer file) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Solaris (Computer file) fast Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
title | Hack proofing Sun Solaris 8 |
title_alt | Hack proofing Sun Solaris eight |
title_auth | Hack proofing Sun Solaris 8 |
title_exact_search | Hack proofing Sun Solaris 8 |
title_full | Hack proofing Sun Solaris 8 Wyman Miles, Ed Mitchell, F. William Lynch ; Randy Cook, technical editor |
title_fullStr | Hack proofing Sun Solaris 8 Wyman Miles, Ed Mitchell, F. William Lynch ; Randy Cook, technical editor |
title_full_unstemmed | Hack proofing Sun Solaris 8 Wyman Miles, Ed Mitchell, F. William Lynch ; Randy Cook, technical editor |
title_short | Hack proofing Sun Solaris 8 |
title_sort | hack proofing sun solaris 8 |
topic | Solaris (Computer file) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Solaris (Computer file) fast Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
topic_facet | Solaris (Computer file) COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer networks Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75888 |
work_keys_str_mv | AT mileswyman hackproofingsunsolaris8 AT mitchelled hackproofingsunsolaris8 AT lynchfwilliam hackproofingsunsolaris8 AT cookrandy hackproofingsunsolaris8 AT mileswyman hackproofingsunsolariseight AT mitchelled hackproofingsunsolariseight AT lynchfwilliam hackproofingsunsolariseight AT cookrandy hackproofingsunsolariseight |