| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910784234803321 |
|
|
Titolo |
Securing HP NonStop servers in an open systems world [[electronic resource] ] : TCP/IP, OSS & SQL / / XYPRO Technology |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Burlington, MA, : Elsevier Digital Press, c2006 |
|
|
|
|
|
|
|
ISBN |
|
1-281-00412-X |
9786611004125 |
0-08-047557-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (1001 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Client/server computing - Security measures |
Hewlett-Packard computers - Security measures |
Computer security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Securing HP Non-StopTM Servers in an Open Systems World; Copyright Page; Contents; Foreword; Preface; Distinguished Contributors; Introduction; A Wider Perspective; Some New Terms; About This Handbook; Applying the Security; Chapter 1. Compliance Concepts; Representative Regulations; Analysis of Requirements in Common; Conclusions; Chapter 2. Changes to Safeguard Since G06.21; Safeguard Changes Included in Release G06.21; Safeguard Changes Included in Release G06.22; Safeguard Changes Included in Release G06.23; Safeguard Changes Included in Release G06.24; Explicit Nodes Example |
Safeguard Changes Included in Release G06.25 Safeguard Changes Included in Release G06.26; Safeguard Changes Included in Release G06.27; Safeguard Changes Included in Release G06.28; Safeguard Changes Included in Release G06.29; Safeguard Subsystem Component Updates; Chapter 3. Securing Pathway Applications; Pathway Development; Pathway Run-Time Components; Chapter 4. TCP/IP; TCP/IP Security; TCP/IP Architecture; HP Non-Stop Server Implementation of TCP/IP; TCP/IP Applications; Firewalls and Routers; |
|
|
|
|
|
|
|
|
|
|
|
VPN; SSH Subsystem; Chapter 5. File Sharing Programs; Network File System (NFS) Subsystem |
Samba Chapter 6. Non-Stop SQL and Database Security; What is Database Security?; Compiling and Executing Non-Stop SQL Programs; Securing Client Queries from ODBC/MX and JDBC/MX; Securing Dynamic SQL Queries; Non-Stop SQL Interactions with other Utilities; Chapter 7. Open Database Connectivity (ODBC) SQL/MP; Security Configuration; Auditing in ODBC; Other ODBC Programs and Utilities; Chapter 8. System Management Tools; Tandem Service Management (TSM) Subsystem; Open System Management (OSM); Distributed Systems Management/Software Configuration Manager; Chapter 9. The Guardian Gazette A-Z |
ADDTOSCF ScriptADDTCPIP Script; ALTERIP Script; APPPRVD System Program; APPSRVR System Program; CIMON System Program; CONFIG System Configuration File; CTCPIP0 and CTCPIP1 Scripts; CEVSMX System Program; Distributed Systems Management/Software Configuration Manager (DSM/SCM); ENOFT User Program; EVNTPRVD System Program; EVTMGR Program; FDIST System Program; FSCK System Utility; IAPRVD System Program; IAREPO File; IMPORT System Program; INIT0 and INIT1 Scripts; INITRD File; Integrity Non-Stop Compilers; LISTNER System Utility; LOGTCPIP Log File; LOGSCF Log Fill 8e; LOGTCP0 and LOGTCP1 Log File |
LOGTCPIP Log File MXANCHOR File Configuration File; MXAUDSRV System Program; MXCMP User Program; MXESP System Program; MXGNAMES System Program; MXOAS System Program; MXOCFG System Program; MXODSN Configuration File; MXOMSG File; MXOSRVR System Program; MXRTDSRV System Program; MXUDR System Program; MXUTP System Program; Network File System (NFS) Subsystem; NFS; NOS System Program; NOSCOM User Program; NOSUTIL System Program; NS System Program; OSMINI Configuration File; OSSFM System Program; Object Code Accelerator (OCA) User Program; OEVPRVD System Program; OSH User Program |
Open System Management (OSM) |
|
|
|
|
|
|
Sommario/riassunto |
|
Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs of security breaches, it is economically essential for companies to become proactive in implementing effective system and data security measures. This volume is a comprehensive reference for understanding security risks, mitigations and best practices as they apply to the various components of these business-critical computing |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910792250903321 |
|
|
Autore |
Sadiq Kamal |
|
|
Titolo |
Paper citizens [[electronic resource] ] : how illegal immigrants acquire citizenship in developing countries / / Kamal Sadiq |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Oxford ; ; New York, : Oxford University Press, c2009 |
|
|
|
|
|
|
|
ISBN |
|
0-19-988813-2 |
0-19-976463-8 |
9786611826000 |
1-281-82600-6 |
0-19-970780-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xv, 275 pages) : illustrations, maps |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Noncitizens - South Asia |
Noncitizens - Southeast Asia |
Noncitizens - Pakistan |
Security, International |
Border crossing |
Illegal immigration |
South Asia Emigration and immigration |
Southeast Asia Emigration and immigration |
Pakistan Emigration and immigration |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. [229]-246) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
A paradox : illegal immigrants as citizens -- The process -- Searching for illegal immigrants -- Networks of complicity -- Blurred membership -- Documentary citizenship -- The proof -- Voters across borders -- Tough ain't enough -- After citizenship. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
In this groundbreaking work, Kamal Sadiq reveals that most of the world's undocumented immigrants are not migrating directly to the US, but to countries in the vast developing world, where they are able to obtain citizenship papers fairly easily. Sadiq introduces "documentary citizenship" to explain how paperwork--often falsely obtained--confers citizenship on undocumented immigrants. Across the globe, |
|
|
|
|
|
|
|
|
|
|
there are literally tens of millions of such undocumented immigrants who have assumed the guise of "citizens." Who, then, is really a citizen? And what does citizenship mean for most of the world's peoples? Rendered in vivid detail, Paper Citizens not only shows how undocumented immigrants acquire false papers, but also sheds light on the consequences this will have for global security in the post 9/11 world--adapted from Google Books |
|
|
|
|
|
| |