AIX 5L version 5.2 security supplement
This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of s...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Austin, TX
IBM Corp., International Technical Support Organization
2003
|
Schriftenreihe: | Redbooks
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051687046 | ||
003 | DE-627-1 | ||
005 | 20240228114556.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2003 xx |||||o 00| ||eng c | ||
020 | |a 9780738499079 |9 978-0-7384-9907-9 | ||
020 | |a 0738499072 |9 0-7384-9907-2 | ||
020 | |a 0738499072 |9 0-7384-9907-2 | ||
035 | |a (DE-627-1)051687046 | ||
035 | |a (DE-599)KEP051687046 | ||
035 | |a (ORHE)0738499072 | ||
035 | |a (DE-627-1)051687046 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Tuttle, Steven |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a AIX 5L version 5.2 security supplement |c Steven Tuttle, Gabriel Pizano, Chris Smith |
264 | 1 | |a Austin, TX |b IBM Corp., International Technical Support Organization |c 2003 | |
300 | |a 1 online resource (xi, 180 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Redbooks | |
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of secure remote commands (RCMDS), Pluggable Authentication Modules (PAM), and examples on how to restrict users. You can use these features individually or integrate them together to improve AIX system security. Use this book as an additional source for security information. Together with existing sources, you may use this book to enhance your knowledge of security and the features included with AIX 5L Version 5.2. You learn about the practical use of these security features, why they are necessary, and how you can use them in your environment to improve security. Plus you gain practical guidance through the examples that are provided and the recommendations for best practice. | ||
546 | |a English. | ||
630 | 2 | 0 | |a AIX (Computer file) |
650 | 0 | |a Operating systems (Computers) | |
650 | 4 | |a AIX (Computer file) | |
650 | 4 | |a AIX (Computer file) | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 4 | |a operating systems | |
650 | 4 | |a Operating systems (Computers) | |
700 | 1 | |a Pizano, Gabriel |e MitwirkendeR |4 ctb | |
700 | 1 | |a Smith, Chris |e MitwirkendeR |4 ctb | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0738499072/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051687046 |
---|---|
_version_ | 1818767275306516480 |
adam_text | |
any_adam_object | |
author | Tuttle, Steven |
author2 | Pizano, Gabriel Smith, Chris |
author2_role | ctb ctb |
author2_variant | g p gp c s cs |
author_facet | Tuttle, Steven Pizano, Gabriel Smith, Chris |
author_role | aut |
author_sort | Tuttle, Steven |
author_variant | s t st |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051687046 (DE-599)KEP051687046 (ORHE)0738499072 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02647cam a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-051687046</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114556.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2003 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738499079</subfield><subfield code="9">978-0-7384-9907-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738499072</subfield><subfield code="9">0-7384-9907-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738499072</subfield><subfield code="9">0-7384-9907-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051687046</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051687046</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0738499072</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051687046</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tuttle, Steven</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">AIX 5L version 5.2 security supplement</subfield><subfield code="c">Steven Tuttle, Gabriel Pizano, Chris Smith</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Austin, TX</subfield><subfield code="b">IBM Corp., International Technical Support Organization</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xi, 180 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of secure remote commands (RCMDS), Pluggable Authentication Modules (PAM), and examples on how to restrict users. You can use these features individually or integrate them together to improve AIX system security. Use this book as an additional source for security information. Together with existing sources, you may use this book to enhance your knowledge of security and the features included with AIX 5L Version 5.2. You learn about the practical use of these security features, why they are necessary, and how you can use them in your environment to improve security. Plus you gain practical guidance through the examples that are provided and the recommendations for best practice.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">AIX (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">AIX (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">AIX (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pizano, Gabriel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Chris</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0738499072/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051687046 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:47:17Z |
institution | BVB |
isbn | 9780738499079 0738499072 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xi, 180 pages) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | IBM Corp., International Technical Support Organization |
record_format | marc |
series2 | Redbooks |
spelling | Tuttle, Steven VerfasserIn aut AIX 5L version 5.2 security supplement Steven Tuttle, Gabriel Pizano, Chris Smith Austin, TX IBM Corp., International Technical Support Organization 2003 1 online resource (xi, 180 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Redbooks Includes bibliographical references and index. - Print version record This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of secure remote commands (RCMDS), Pluggable Authentication Modules (PAM), and examples on how to restrict users. You can use these features individually or integrate them together to improve AIX system security. Use this book as an additional source for security information. Together with existing sources, you may use this book to enhance your knowledge of security and the features included with AIX 5L Version 5.2. You learn about the practical use of these security features, why they are necessary, and how you can use them in your environment to improve security. Plus you gain practical guidance through the examples that are provided and the recommendations for best practice. English. AIX (Computer file) Operating systems (Computers) Systèmes d'exploitation (Ordinateurs) operating systems Pizano, Gabriel MitwirkendeR ctb Smith, Chris MitwirkendeR ctb TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/0738499072/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Tuttle, Steven AIX 5L version 5.2 security supplement AIX (Computer file) Operating systems (Computers) Systèmes d'exploitation (Ordinateurs) operating systems |
title | AIX 5L version 5.2 security supplement |
title_auth | AIX 5L version 5.2 security supplement |
title_exact_search | AIX 5L version 5.2 security supplement |
title_full | AIX 5L version 5.2 security supplement Steven Tuttle, Gabriel Pizano, Chris Smith |
title_fullStr | AIX 5L version 5.2 security supplement Steven Tuttle, Gabriel Pizano, Chris Smith |
title_full_unstemmed | AIX 5L version 5.2 security supplement Steven Tuttle, Gabriel Pizano, Chris Smith |
title_short | AIX 5L version 5.2 security supplement |
title_sort | aix 5l version 5 2 security supplement |
topic | AIX (Computer file) Operating systems (Computers) Systèmes d'exploitation (Ordinateurs) operating systems |
topic_facet | AIX (Computer file) Operating systems (Computers) Systèmes d'exploitation (Ordinateurs) operating systems |
url | https://learning.oreilly.com/library/view/-/0738499072/?ar |
work_keys_str_mv | AT tuttlesteven aix5lversion52securitysupplement AT pizanogabriel aix5lversion52securitysupplement AT smithchris aix5lversion52securitysupplement |