After covering system configuration, the book goes on to discuss several noncommercial and commercial security programs that help you analyze your network for weaknesses. Appendices introduce related topics such as the HotJava browser, the Java and JavaScript languages, the Kerberos authentication scheme, and PGP. Some of this material seems out-of-date, such as the discussion of HotJava and the fact that neither Microsoft's Windows NT nor Internet Explorer is mentioned. If the authors had left out this weaker Internet material and called this book "Securing your Unix network," it would be a solid title.
Internet & TCP/IP Network Security
📄 Viewing lite version
Full site ›
Book Details
Author(s)Uday O. Pabrai, Vijay K. Gurbani
PublisherComputing Mcgraw-Hill
ISBN / ASIN0070482152
ISBN-139780070482159
Sales Rank14,480,540
CategoryComputers
MarketplaceUnited States 🇺🇸
Description ▲
The heart of this somewhat dry book is a step-by-step guide to implementing a secure Unix network. The book defines each security issue and follows with instructions on what parameters to set, what programs to run, and which files to check. This is useful but doesn't convey much high-level knowledge in the process. You could set up a whole system according to these directions and still not really understand why or how it all works. Whether you will benefit from this cookbook approach depends on your desire to explore every last corner of Unix.
More Books in Computers
David Busch's Nikon D5000 Guide to Digital SLR Photogr…
View
Engineering Design with SOLIDWORKS 2016 (Including uni…
View
Microsoft Excel 2010 (Step By Step)
View
CONCUR'93: 4th International Conference on Concurrency…
View
HTML5 Games: Creating Fun with HTML5, CSS3, and WebGL
View
Advanced Techniques for Assessment Surface Topography:…
View
Java Gently for Engineers and Scientists (Internationa…
View
Beginning Microsoft SQL Server 2008 Administration
View