.

Personnaliser

OK
Solibri
avatar logo
Solibri
icons /french flag

Pro

icons / nav24 / chevron right
4,8/5 sur + de 1 000 ventes

Mentions légales

Practical Unix and Internet Security - Alan Schwartz

Note : 3

1 avis

Vous en avez un à vendre ?

Vendez-le-vôtre
 
Vous avez choisi le retrait chez le vendeur à
  • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
  • Récupérez le produit directement chez le vendeur
  • Rakuten vous rembourse en cas de problème

Gratuit et sans engagement

Félicitations !

Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

En savoir plus

Retour

Horaires

      Note :

      Présentation Practical Unix And Internet Security de Alan Schwartz Format Broché

       - Livre Informatique

      Livre Informatique - Alan Schwartz - 01/04/2003 - Broché - Langue : Anglais

      . .

    • Auteur(s) : Alan Schwartz - Gene Spafford - Simson Garfinkel
    • Editeur : O'reilly Media, Inc.
    • Langue : Anglais
    • Parution : 01/04/2003
    • Format : Moyen, de 350g à 1kg
    • Nombre de pages : 986.0
    • Expédition : 1348
    • ISBN : 0596003234



    • Résumé :

      • Preface
      • Computer Security Basics
          Chapter 1: Introduction: Some Fundamental Questions Chapter 2: Unix History and Lineage Chapter 3: Policies and Guidelines
        Security Building Blocks Chapter 4: Users, Passwords, and Authentication Chapter 5: Users, Groups, and the Superuser Chapter 6: Filesystems and Security Chapter 7: Cryptography Basics Chapter 8: Physical Security for Servers Chapter 9: Personnel Security Network and Internet Security Chapter 10: Modems and Dialup Security Chapter 11: TCP/IP Networks Chapter 12: Securing TCP and UDP Services Chapter 13: Sun RPC Chapter 14: Network-Based Authentication Systems Chapter 15: Network Filesystems Chapter 16: Secure Programming Techniques Secure Operations Chapter 17: Keeping Up to Date Chapter 18: Backups Chapter 19: Defending Accounts Chapter 20: Integrity Management Chapter 21: Auditing, Logging, and Forensics Handling Security Incidents Chapter 22: Discovering a Break-in Chapter 23: Protecting Against Programmed Threats Chapter 24: Denial of Service Attacks and Solutions Chapter 25: Computer Crime Chapter 26: Who Do You Trust? Appendixes Unix Security Checklist Unix Processes Paper Sources Electronic Resources Organizations Colophon...

        Biographie:

        • Preface
        • Computer Security Basics
            Chapter 1: Introduction: Some Fundamental Questions Chapter 2: Unix History and Lineage Chapter 3: Policies and Guidelines
          Security Building Blocks Chapter 4: Users, Passwords, and Authentication Chapter 5: Users, Groups, and the Superuser Chapter 6: Filesystems and Security Chapter 7: Cryptography Basics Chapter 8: Physical Security for Servers Chapter 9: Personnel Security Network and Internet Security Chapter 10: Modems and Dialup Security Chapter 11: TCP/IP Networks Chapter 12: Securing TCP and UDP Services Chapter 13: Sun RPC Chapter 14: Network-Based Authentication Systems Chapter 15: Network Filesystems Chapter 16: Secure Programming Techniques Secure Operations Chapter 17: Keeping Up to Date Chapter 18: Backups Chapter 19: Defending Accounts Chapter 20: Integrity Management Chapter 21: Auditing, Logging, and Forensics Handling Security Incidents Chapter 22: Discovering a Break-in Chapter 23: Protecting Against Programmed Threats Chapter 24: Denial of Service Attacks and Solutions Chapter 25: Computer Crime Chapter 26: Who Do You Trust? Appendixes Unix Security Checklist Unix Processes Paper Sources Electronic Resources Organizations Colophon...

          Sommaire:

          • Preface
          • Computer Security Basics
              Chapter 1: Introduction: Some Fundamental Questions Chapter 2: Unix History and Lineage Chapter 3: Policies and Guidelines
            Security Building Blocks Chapter 4: Users, Passwords, and Authentication Chapter 5: Users, Groups, and the Superuser Chapter 6: Filesystems and Security Chapter 7: Cryptography Basics Chapter 8: Physical Security for Servers Chapter 9: Personnel Security Network and Internet Security Chapter 10: Modems and Dialup Security Chapter 11: TCP/IP Networks Chapter 12: Securing TCP and UDP Services Chapter 13: Sun RPC Chapter 14: Network-Based Authentication Systems Chapter 15: Network Filesystems Chapter 16: Secure Programming Techniques Secure Operations Chapter 17: Keeping Up to Date Chapter 18: Backups Chapter 19: Defending Accounts Chapter 20: Integrity Management Chapter 21: Auditing, Logging, and Forensics Handling Security Incidents Chapter 22: Discovering a Break-in Chapter 23: Protecting Against Programmed Threats Chapter 24: Denial of Service Attacks and Solutions Chapter 25: Computer Crime Chapter 26: Who Do You Trust? Appendixes Unix Security Checklist Unix Processes Paper Sources Electronic Resources Organizations Colophon...

      Avis sur Practical Unix And Internet Security de Alan Schwartz Format Broché  - Livre Informatique

      Note : 3 1 avis sur Practical Unix And Internet Security de Alan Schwartz Format Broché  - Livre Informatique

      Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


      Le choixNeuf et occasion
      Minimum5% remboursés
      La sécuritéSatisfait ou remboursé
      Le service clientsÀ votre écoute
      LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
      visavisa
      mastercardmastercard
      klarnaklarna
      paypalpaypal
      floafloa
      americanexpressamericanexpress
      Rakuten Logo
      • Rakuten Kobo
      • Rakuten TV
      • Rakuten Viber
      • Rakuten Viki
      • Plus de services
      • À propos de Rakuten
      Rakuten.com