LEADER 03476nam a2200445Ii 4500 001 991003253269707536 006 m d 007 cr cn||||||||| 008 070806s2001 maua s 001 0 eng d 020 $a9781928994442 020 $a192899444X 035 $ab13655954-39ule_inst 037 $a100776:100784$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a005.8$222 100 1 $aMiles, Wyman.$0627566 245 10$aHack proofing Sun Solaris 8$h[electronic resource] /$cWyman Miles, Ed Mitchell, F. William Lynch ; Randy Cook, technical editor. 246 3 $aHack proofing Sun Solaris eight 260 $aRockland, Mass. :$bSyngress Pub. :$bDistributed by Publishers Group West,$cc2001. 300 $axxiii, 407 p. :$bill. ;$c24 cm. 500 $aIncludes index. 505 0 $aIntroducting Solaris security -- Securing Solaris with the bundled security tools -- Securing Solaris with freeware security tools -- Securing your users -- Securing your files -- Securing your network -- Providing secure web and mail services -- Configuring Solaris as a secure router and firewall -- Using squid on Solaris -- Dissecting hacks -- Detecting and denying hacks -- Hack proofing Sun Solaris 8 fast track -- Index. 520 $aThe only way to stop a hacker is to think like one! Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers. The fifth title in the popular series that brought us the bestseller Hack Proofing Your Network Teaches strategy and techniques using forensic-based analysis Up to the minute Web-based support with solutions@syngress.com. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 630 00$aSolaris (Computer file) 650 0$aComputer security. 650 0$aComputer networks$xSecurity measures. 655 7$aElectronic books.$2local 700 1 $aMitchell, Ed,$d1945-$eauthor$4http://id.loc.gov/vocabulary/relators/aut$042600 700 1 $aLynch, F. William.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0739060 700 1 $aCook, Randy. 776 1 $cOriginal$z192899444X$z9781928994442$w(OCoLC)49622120 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781928994442$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13655954$b24-02-22$c24-01-08 912 $a991003253269707536 994 $aC0$bTEF 996 $aHack proofing Sun Solaris 8$91464007 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0