This book provides a comprehensive source for features, capabilities, how to instructions, security recommendations, and best practices for securing systems using the Solaris Security Toolkit software. Securing computer systems against unauthorized access is one of the most pressing issues facing today's data center administrators. As with any security decision, a balance must be attained between system manageability and security. Many attacks have preventative solutions available; however, every day, hackers compromise systems using well-known attack methods. Using the software, tools, recommendations, and best practices presented in this book to harden systems and minimize entry points to intruders can increase security of your systems. *Simplify securing and auditing your Solaris systems using extensible software, recommended tools, and best practices. *Apply a framework to create a flexible, scalable, and maintainable method of securing systems. *Develop and deploy custom security profiles for different environments and organizations. *Use standard templates, security profiles, and scripts to secure popular Sun products.* Automate and manage OE installations for consistency and security.
评分
评分
评分
评分
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等
© 2025 book.wenda123.org All Rights Reserved. 图书目录大全 版权所有