This book shows users how the security mechanisms in UNIX can be linked together in a practical, cohesive security plan.Discusses how to set up a security plan from an administrator's point of view, as well as how end users can protect their own files and workstationsContains sample policies for different types of organizations, from casual use systems to highly secure systemsDisk includes SecureAll, a replacement for the popular program COPS
評分
評分
評分
評分
本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度,google,bing,sogou 等
© 2025 qciss.net All Rights Reserved. 小哈圖書下載中心 版权所有