Unix Security: A Practical Tutorial (Unix/C)

[N. Derek Arnold] » Unix Security: A Practical Tutorial (Unix/C) ☆ Read Online eBook or Kindle ePUB. Unix Security: A Practical Tutorial (Unix/C) The guide includes all the essential tools and techniques to manage and control security in a UNIX system. This hands-on tutorial for UNIX users and programmers provides in-depth information on how to protect UNIX-based computers systems from unauthorized users and destructive data manipulation. Practical coverage includes: information control and the effective use of the UNIX file system permissions; the UNIX boot path; audit programs and special files; UNIX commands to watch out for; securing

Unix Security: A Practical Tutorial (Unix/C)

Author :
Rating : 4.83 (907 Votes)
Asin : 0070025606
Format Type : paperback
Number of Pages : 386 Pages
Publish Date : 0000-00-00
Language : English

DESCRIPTION:

The guide includes all the essential tools and techniques to manage and control security in a UNIX system. This hands-on tutorial for UNIX users and programmers provides in-depth information on how to protect UNIX-based computers systems from unauthorized users and destructive data manipulation. Practical coverage includes: information control and the effective use of the UNIX file system permissions; the UNIX boot path; audit programs and special files; UNIX commands to watch out for; securing incoming modems; and special considerations dealing with networks.

"Good for its time, yet interesting today" according to Diego Bravo Estrada. This book is old: it was registered in Library of Congress Catalog in 1992 (publisher year is 199Good for its time, yet interesting today This book is old: it was registered in Library of Congress Catalog in 1992 (publisher year is 1993) so my review takes into account the 16 years passed.Being from 1992, the book was written with the "Unix mindset" of the 80's, so we will find (or miss):* Half of the book (the full second part) are just full C language listings, reflecting the fact that current Unix users/admins were also C programmers or at least able to test C source code* The "TCP LAN" wasn't yet synonym of networking, and just 7 pages are devoted to explaining the "hosts.equiv" mechanisms and security problems; and finally an overview of Kerberos . ) so my review takes into account the 16 years passed.Being from 1992, the book was written with the "Unix mindset" of the 80's, so we will find (or miss):* Half of the book (the full second part) are just full C language listings, reflecting the fact that current Unix users/admins were also C programmers or at least able to test C source code* The "TCP LAN" wasn't yet synonym of networking, and just 7 pages are devoted to explaining the "hosts.equiv" mechanisms and security problems; and finally an overview of Kerberos . "Outdated" according to A Customer. This book is terrible. It's very outdated and has no information on ethernet sniffing, icmp packets, or ip spoofing. A 1Outdated This book is terrible. It's very outdated and has no information on ethernet sniffing, icmp packets, or ip spoofing. A 13 year old with an aol account knows as much as the author.. year old with an aol account knows as much as the author.

OTHER BOOK COLLECTION