This book shows users how the security mechanisms in UNIX can be linked together in a practical, cohesive security plan.Discusses how to set up a security plan from an administrator's point of view, as well as how end users can protect their own files and workstationsContains sample policies for different types of organizations, from casual use systems to highly secure systemsDisk includes SecureAll, a replacement for the popular program COPS
评分
评分
评分
评分
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等
© 2025 book.wenda123.org All Rights Reserved. 图书目录大全 版权所有