AIX 5L version 5.2 security supplement

This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Tuttle, Steven (VerfasserIn)
Weitere Verfasser: Pizano, Gabriel (MitwirkendeR), Smith, Chris (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Austin, TX IBM Corp., International Technical Support Organization 2003
Schriftenreihe:Redbooks
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-051687046
003 DE-627-1
005 20240228114556.0
007 cr uuu---uuuuu
008 200417s2003 xx |||||o 00| ||eng c
020 |a 9780738499079  |9 978-0-7384-9907-9 
020 |a 0738499072  |9 0-7384-9907-2 
020 |a 0738499072  |9 0-7384-9907-2 
035 |a (DE-627-1)051687046 
035 |a (DE-599)KEP051687046 
035 |a (ORHE)0738499072 
035 |a (DE-627-1)051687046 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
100 1 |a Tuttle, Steven  |e VerfasserIn  |4 aut 
245 1 0 |a AIX 5L version 5.2 security supplement  |c Steven Tuttle, Gabriel Pizano, Chris Smith 
264 1 |a Austin, TX  |b IBM Corp., International Technical Support Organization  |c 2003 
300 |a 1 online resource (xi, 180 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a Redbooks 
500 |a Includes bibliographical references and index. - Print version record 
520 |a This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of secure remote commands (RCMDS), Pluggable Authentication Modules (PAM), and examples on how to restrict users. You can use these features individually or integrate them together to improve AIX system security. Use this book as an additional source for security information. Together with existing sources, you may use this book to enhance your knowledge of security and the features included with AIX 5L Version 5.2. You learn about the practical use of these security features, why they are necessary, and how you can use them in your environment to improve security. Plus you gain practical guidance through the examples that are provided and the recommendations for best practice. 
546 |a English. 
630 2 0 |a AIX (Computer file) 
650 0 |a Operating systems (Computers) 
650 4 |a AIX (Computer file) 
650 4 |a AIX (Computer file) 
650 4 |a Systèmes d'exploitation (Ordinateurs) 
650 4 |a operating systems 
650 4 |a Operating systems (Computers) 
700 1 |a Pizano, Gabriel  |e MitwirkendeR  |4 ctb 
700 1 |a Smith, Chris  |e MitwirkendeR  |4 ctb 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/0738499072/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-051687046
_version_ 1818767275306516480
adam_text
any_adam_object
author Tuttle, Steven
author2 Pizano, Gabriel
Smith, Chris
author2_role ctb
ctb
author2_variant g p gp
c s cs
author_facet Tuttle, Steven
Pizano, Gabriel
Smith, Chris
author_role aut
author_sort Tuttle, Steven
author_variant s t st
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)051687046
(DE-599)KEP051687046
(ORHE)0738499072
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02647cam a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-051687046</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114556.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2003 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738499079</subfield><subfield code="9">978-0-7384-9907-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738499072</subfield><subfield code="9">0-7384-9907-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738499072</subfield><subfield code="9">0-7384-9907-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051687046</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051687046</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0738499072</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051687046</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tuttle, Steven</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">AIX 5L version 5.2 security supplement</subfield><subfield code="c">Steven Tuttle, Gabriel Pizano, Chris Smith</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Austin, TX</subfield><subfield code="b">IBM Corp., International Technical Support Organization</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xi, 180 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of secure remote commands (RCMDS), Pluggable Authentication Modules (PAM), and examples on how to restrict users. You can use these features individually or integrate them together to improve AIX system security. Use this book as an additional source for security information. Together with existing sources, you may use this book to enhance your knowledge of security and the features included with AIX 5L Version 5.2. You learn about the practical use of these security features, why they are necessary, and how you can use them in your environment to improve security. Plus you gain practical guidance through the examples that are provided and the recommendations for best practice.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">AIX (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">AIX (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">AIX (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pizano, Gabriel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Chris</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0738499072/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-051687046
illustrated Illustrated
indexdate 2024-12-18T08:47:17Z
institution BVB
isbn 9780738499079
0738499072
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (xi, 180 pages) illustrations
psigel ZDB-30-ORH
publishDate 2003
publishDateSearch 2003
publishDateSort 2003
publisher IBM Corp., International Technical Support Organization
record_format marc
series2 Redbooks
spelling Tuttle, Steven VerfasserIn aut
AIX 5L version 5.2 security supplement Steven Tuttle, Gabriel Pizano, Chris Smith
Austin, TX IBM Corp., International Technical Support Organization 2003
1 online resource (xi, 180 pages) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Redbooks
Includes bibliographical references and index. - Print version record
This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of secure remote commands (RCMDS), Pluggable Authentication Modules (PAM), and examples on how to restrict users. You can use these features individually or integrate them together to improve AIX system security. Use this book as an additional source for security information. Together with existing sources, you may use this book to enhance your knowledge of security and the features included with AIX 5L Version 5.2. You learn about the practical use of these security features, why they are necessary, and how you can use them in your environment to improve security. Plus you gain practical guidance through the examples that are provided and the recommendations for best practice.
English.
AIX (Computer file)
Operating systems (Computers)
Systèmes d'exploitation (Ordinateurs)
operating systems
Pizano, Gabriel MitwirkendeR ctb
Smith, Chris MitwirkendeR ctb
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/0738499072/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Tuttle, Steven
AIX 5L version 5.2 security supplement
AIX (Computer file)
Operating systems (Computers)
Systèmes d'exploitation (Ordinateurs)
operating systems
title AIX 5L version 5.2 security supplement
title_auth AIX 5L version 5.2 security supplement
title_exact_search AIX 5L version 5.2 security supplement
title_full AIX 5L version 5.2 security supplement Steven Tuttle, Gabriel Pizano, Chris Smith
title_fullStr AIX 5L version 5.2 security supplement Steven Tuttle, Gabriel Pizano, Chris Smith
title_full_unstemmed AIX 5L version 5.2 security supplement Steven Tuttle, Gabriel Pizano, Chris Smith
title_short AIX 5L version 5.2 security supplement
title_sort aix 5l version 5 2 security supplement
topic AIX (Computer file)
Operating systems (Computers)
Systèmes d'exploitation (Ordinateurs)
operating systems
topic_facet AIX (Computer file)
Operating systems (Computers)
Systèmes d'exploitation (Ordinateurs)
operating systems
url https://learning.oreilly.com/library/view/-/0738499072/?ar
work_keys_str_mv AT tuttlesteven aix5lversion52securitysupplement
AT pizanogabriel aix5lversion52securitysupplement
AT smithchris aix5lversion52securitysupplement