Practical Unix and Internet Security - Alan Schwartz
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
-
A Book Of Days
Neuf dès 32,46 €
Occasion dès 28,97 €
-
The Art Of How To Train Your Dragon 2
2 avis
Neuf dès 41,13 €
Occasion dès 40,01 €
-
David Lynch, Digital Nudes
2 avis
Neuf dès 55,00 €
Occasion dès 51,01 €
-
Uzbekistan
Neuf dès 39,59 €
Occasion dès 36,58 €
-
Le Bout Des Bordes N°15
Neuf dès 40,00 €
Occasion dès 39,99 €
-
L' Officina Benedetto Antelami Della Cattedrale Di Fidenza. Studi, Ricerche E Restauro
Occasion dès 55,00 €
-
L' Analisi Degli Spettacoli. Teatro, Mimo, Danza, Teatro-Danza, Cinema
Neuf dès 47,97 €
Occasion dès 37,99 €
-
Sexy Record Covers
Neuf dès 60,00 €
Occasion dès 53,90 €
-
Das Einzige Glutenfreie Kochbuch, Das Du Brauchst
Neuf dès 35,78 €
Occasion dès 29,58 €
-
100 : ... 289; (Japanese Edition)
Occasion dès 41,10 €
-
Voyages En Van - 100 Itinéraires En France Et En Europe - Exclu Fnac
Occasion dès 39,95 €
-
The Incomplete
Neuf dès 50,00 €
Occasion dès 49,99 €
-
Alsace - Mille Et Un Trésors
Neuf dès 37,00 €
Occasion dès 33,50 €
-
Ii 2 25
Neuf dès 59,24 €
Occasion dès 39,90 €
-
Arts & Architecture 1950-1954
Neuf dès 79,61 €
Occasion dès 72,69 €
-
Cenerentola E Le Scarpette Di Pelo
Occasion dès 39,49 €
-
La Maison Rustique. Tome 1
Occasion dès 29,50 €
-
Elektrokonstruktion
Occasion dès 38,15 €
-
Le Muse Nascoste. Protagoniste Dimenticate Di Grandi Opere D'arte
Occasion dès 66,30 €
-
Mijn Nachten Met Spinoza
Occasion dès 28,99 €
Produits similaires
Présentation Practical Unix And Internet Security de Alan Schwartz Format Broché
- Livre Informatique
Résumé :
Chapter 1: Introduction: Some Fundamental Questions Chapter 2: Unix History and Lineage Chapter 3: Policies and Guidelines
Security Building Blocks Chapter 4: Users, Passwords, and Authentication Chapter 5: Users, Groups, and the Superuser Chapter 6: Filesystems and Security Chapter 7: Cryptography Basics Chapter 8: Physical Security for Servers Chapter 9: Personnel Security Network and Internet Security Chapter 10: Modems and Dialup Security Chapter 11: TCP/IP Networks Chapter 12: Securing TCP and UDP Services Chapter 13: Sun RPC Chapter 14: Network-Based Authentication Systems Chapter 15: Network Filesystems Chapter 16: Secure Programming Techniques Secure Operations Chapter 17: Keeping Up to Date Chapter 18: Backups Chapter 19: Defending Accounts Chapter 20: Integrity Management Chapter 21: Auditing, Logging, and Forensics Handling Security Incidents Chapter 22: Discovering a Break-in Chapter 23: Protecting Against Programmed Threats Chapter 24: Denial of Service Attacks and Solutions Chapter 25: Computer Crime Chapter 26: Who Do You Trust? Appendixes Unix Security Checklist Unix Processes Paper Sources Electronic Resources Organizations Colophon...
Biographie:
Chapter 1: Introduction: Some Fundamental Questions Chapter 2: Unix History and Lineage Chapter 3: Policies and Guidelines
Security Building Blocks Chapter 4: Users, Passwords, and Authentication Chapter 5: Users, Groups, and the Superuser Chapter 6: Filesystems and Security Chapter 7: Cryptography Basics Chapter 8: Physical Security for Servers Chapter 9: Personnel Security Network and Internet Security Chapter 10: Modems and Dialup Security Chapter 11: TCP/IP Networks Chapter 12: Securing TCP and UDP Services Chapter 13: Sun RPC Chapter 14: Network-Based Authentication Systems Chapter 15: Network Filesystems Chapter 16: Secure Programming Techniques Secure Operations Chapter 17: Keeping Up to Date Chapter 18: Backups Chapter 19: Defending Accounts Chapter 20: Integrity Management Chapter 21: Auditing, Logging, and Forensics Handling Security Incidents Chapter 22: Discovering a Break-in Chapter 23: Protecting Against Programmed Threats Chapter 24: Denial of Service Attacks and Solutions Chapter 25: Computer Crime Chapter 26: Who Do You Trust? Appendixes Unix Security Checklist Unix Processes Paper Sources Electronic Resources Organizations Colophon...
Sommaire:
Chapter 1: Introduction: Some Fundamental Questions Chapter 2: Unix History and Lineage Chapter 3: Policies and Guidelines
Security Building Blocks Chapter 4: Users, Passwords, and Authentication Chapter 5: Users, Groups, and the Superuser Chapter 6: Filesystems and Security Chapter 7: Cryptography Basics Chapter 8: Physical Security for Servers Chapter 9: Personnel Security Network and Internet Security Chapter 10: Modems and Dialup Security Chapter 11: TCP/IP Networks Chapter 12: Securing TCP and UDP Services Chapter 13: Sun RPC Chapter 14: Network-Based Authentication Systems Chapter 15: Network Filesystems Chapter 16: Secure Programming Techniques Secure Operations Chapter 17: Keeping Up to Date Chapter 18: Backups Chapter 19: Defending Accounts Chapter 20: Integrity Management Chapter 21: Auditing, Logging, and Forensics Handling Security Incidents Chapter 22: Discovering a Break-in Chapter 23: Protecting Against Programmed Threats Chapter 24: Denial of Service Attacks and Solutions Chapter 25: Computer Crime Chapter 26: Who Do You Trust? Appendixes Unix Security Checklist Unix Processes Paper Sources Electronic Resources Organizations Colophon...
Avis sur Practical Unix And Internet Security de Alan Schwartz Format Broché - Livre Informatique
1 avis sur Practical Unix And Internet Security de Alan Schwartz Format Broché - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
