Personnaliser

OK

Practical Unix and Internet Security - Alan Schwartz

Note : 3

1 avis

Vous en avez un à vendre ?

Vendez-le-vôtre

56,62 €

Produit Neuf

  • Ou 14,16 € /mois

    • Livraison à 0,01 €
    Voir les modes de livraison

    rarewaves-us

    PRO Vendeur favori

    4,7/5 sur + de 1 000 ventes

    Nouvel article expédié dans le 24H à partir des Etats Unis Livraison au bout de 14 à 21 jours ouvrables.

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Practical Unix And Internet Security de Alan Schwartz Format Broché  - Livre Informatique

        Note : 3 1 avis sur Practical Unix And Internet Security de Alan Schwartz Format Broché  - Livre Informatique

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Practical Unix And Internet Security de Alan Schwartz Format Broché

         - Livre Informatique

        Livre Informatique - Alan Schwartz - 01/04/2003 - Broché - Langue : Anglais

        . .

      • Auteur(s) : Alan Schwartz - Gene Spafford - Simson Garfinkel
      • Editeur : O'reilly Media, Inc.
      • Langue : Anglais
      • Parution : 01/04/2003
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 986.0
      • Expédition : 1348
      • ISBN : 0596003234



      • Résumé :

        • Preface
        • Computer Security Basics
            Chapter 1: Introduction: Some Fundamental Questions Chapter 2: Unix History and Lineage Chapter 3: Policies and Guidelines
          Security Building Blocks Chapter 4: Users, Passwords, and Authentication Chapter 5: Users, Groups, and the Superuser Chapter 6: Filesystems and Security Chapter 7: Cryptography Basics Chapter 8: Physical Security for Servers Chapter 9: Personnel Security Network and Internet Security Chapter 10: Modems and Dialup Security Chapter 11: TCP/IP Networks Chapter 12: Securing TCP and UDP Services Chapter 13: Sun RPC Chapter 14: Network-Based Authentication Systems Chapter 15: Network Filesystems Chapter 16: Secure Programming Techniques Secure Operations Chapter 17: Keeping Up to Date Chapter 18: Backups Chapter 19: Defending Accounts Chapter 20: Integrity Management Chapter 21: Auditing, Logging, and Forensics Handling Security Incidents Chapter 22: Discovering a Break-in Chapter 23: Protecting Against Programmed Threats Chapter 24: Denial of Service Attacks and Solutions Chapter 25: Computer Crime Chapter 26: Who Do You Trust? Appendixes Unix Security Checklist Unix Processes Paper Sources Electronic Resources Organizations Colophon...

          Biographie:

          • Preface
          • Computer Security Basics
              Chapter 1: Introduction: Some Fundamental Questions Chapter 2: Unix History and Lineage Chapter 3: Policies and Guidelines
            Security Building Blocks Chapter 4: Users, Passwords, and Authentication Chapter 5: Users, Groups, and the Superuser Chapter 6: Filesystems and Security Chapter 7: Cryptography Basics Chapter 8: Physical Security for Servers Chapter 9: Personnel Security Network and Internet Security Chapter 10: Modems and Dialup Security Chapter 11: TCP/IP Networks Chapter 12: Securing TCP and UDP Services Chapter 13: Sun RPC Chapter 14: Network-Based Authentication Systems Chapter 15: Network Filesystems Chapter 16: Secure Programming Techniques Secure Operations Chapter 17: Keeping Up to Date Chapter 18: Backups Chapter 19: Defending Accounts Chapter 20: Integrity Management Chapter 21: Auditing, Logging, and Forensics Handling Security Incidents Chapter 22: Discovering a Break-in Chapter 23: Protecting Against Programmed Threats Chapter 24: Denial of Service Attacks and Solutions Chapter 25: Computer Crime Chapter 26: Who Do You Trust? Appendixes Unix Security Checklist Unix Processes Paper Sources Electronic Resources Organizations Colophon...

            Sommaire:

            • Preface
            • Computer Security Basics
                Chapter 1: Introduction: Some Fundamental Questions Chapter 2: Unix History and Lineage Chapter 3: Policies and Guidelines
              Security Building Blocks Chapter 4: Users, Passwords, and Authentication Chapter 5: Users, Groups, and the Superuser Chapter 6: Filesystems and Security Chapter 7: Cryptography Basics Chapter 8: Physical Security for Servers Chapter 9: Personnel Security Network and Internet Security Chapter 10: Modems and Dialup Security Chapter 11: TCP/IP Networks Chapter 12: Securing TCP and UDP Services Chapter 13: Sun RPC Chapter 14: Network-Based Authentication Systems Chapter 15: Network Filesystems Chapter 16: Secure Programming Techniques Secure Operations Chapter 17: Keeping Up to Date Chapter 18: Backups Chapter 19: Defending Accounts Chapter 20: Integrity Management Chapter 21: Auditing, Logging, and Forensics Handling Security Incidents Chapter 22: Discovering a Break-in Chapter 23: Protecting Against Programmed Threats Chapter 24: Denial of Service Attacks and Solutions Chapter 25: Computer Crime Chapter 26: Who Do You Trust? Appendixes Unix Security Checklist Unix Processes Paper Sources Electronic Resources Organizations Colophon...

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com