02588nam 2200529Ia 450 991078352900332120200520144314.0(CKB)1000000000243338(OCoLC)614898224(CaPaEBR)ebrary10112129(SSID)ssj0000276760(PQKBManifestationID)11209099(PQKBTitleCode)TC0000276760(PQKBWorkID)10226227(PQKB)10522387(Au-PeEL)EBL3306378(CaPaEBR)ebr10112129(CaSebORM)0738499072(MiAaPQ)EBC3306378(EXLCZ)99100000000024333820050818d2003 uy 0engurcn|||||||||txtccrAIX 5L version 5.2 security supplement[electronic resource] /Steven Tuttle, Gabriel Pizano, Chris SmithAustin, TX IBM Corp., International Technical Support Organizationc20031 online resource (198 p.) Redbooks"November 2003.'0-7384-9907-2 Includes bibliographical references and index.This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of secure remote commands (RCMDS), Pluggable Authentication Modules (PAM), and examples on how to restrict users. You can use these features individually or integrate them together to improve AIX system security. Use this book as an additional source for security information. Together with existing sources, you may use this book to enhance your knowledge of security and the features included with AIX 5L Version 5.2. You learn about the practical use of these security features, why they are necessary, and how you can use them in your environment to improve security. Plus you gain practical guidance through the examples that are provided and the recommendations for best practice.IBM redbooks.Operating systems (Computers)Operating systems (Computers)Tuttle Steven1476812Pizano Gabriel1476813Smith Chris373829MiAaPQMiAaPQMiAaPQBOOK9910783529003321AIX 5L version 5.2 security supplement3691602UNINA