Star Wars Sale
 
 

Special Offers see all

Enter to WIN!

Weekly drawing for $100 credit. Subscribe to PowellsBooks.news for a chance to win.
Privacy Policy

More at Powell's


Recently Viewed clear list


Original Essays | June 20, 2014

Lauren Owen: IMG The Other Vampire



It's a wild and thundery night. Inside a ramshackle old manor house, a beautiful young girl lies asleep in bed. At the window, a figure watches... Continue »
  1. $18.90 Sale Hardcover add to wish list

    The Quick

    Lauren Owen 9780812993271

spacer

On Order

$50.75
New Trade Paper
Currently out of stock.
Add to Wishlist
available for shipping or prepaid pickup only
Qty Store Section
- Local Warehouse Networking- Computer Security

Other titles in the Hewlett-Packard Professional Books series:

HP-UX 11i Security (Hewlett-Packard Professional Books)

by

HP-UX 11i Security (Hewlett-Packard Professional Books) Cover

 

Synopses & Reviews

Publisher Comments:

The total HP-UX 11i security reference and implementation guide
  • Thorough coverage of HP-UX 11i's powerful new host security features
  • Monitoring system access, activity, and change
  • 10 ways to gain root access-what every system administrator needs to know
  • Implementing Kerberos, PAM, IPSec, SCM, SCR, and IDS/9000

No other book offers this much HP-UX-specific security coverage! In this authoritative, comprehensive administrator's guide, leading HP-UX consultant Chris Wong covers every key aspect of HP-UX host security. Wong introduces "hot-off-the-press" HP-UX 11i capabilities and techniques for keeping mission-critical systems safe-even when firewalls fail and backdoors are discovered. Coverage includes:

  • Understanding and addressing your key vulnerabilities
  • 10 ways to gain root access-and what to do about them
  • Managing users, groups, files, and directories from a security perspective
  • Controlling access to the system and securing key services
  • Safely distributing root privileges
  • Using HP-UX software to enhance system security: SCM, SCR, Restricted SAM, IDS/9000, and the Security Patch Check Tool
  • Security techniques for the multi-host environment: Berkeley programs, SSH, NIS, NIS+, LDAP, Kerberos, PAM, and IPSec/9000
  • Tools and techniques for monitoring system activity and change
  • Using public-domain programs: SARA, Tripwire, sudo, and logrotate

HP-UX 11i Security is the essential security resource for every HP-UX system administrator, from novice to advanced level—and for every consultant, manager, security specialist, and e-business professional responsible for protecting HP-UX applications and data.

Book News Annotation:

Recommends procedures for protecting HP-UX networks from both external and internal attacks. The author focuses on permissions and user management, but also suggests some HP-UX add-on products for securing the environment. Topics include restricted SAM, the sudo program, the service control manager, Internet daemon services, Kerberos, and monitoring system activity and changes.
Annotation c. Book News, Inc., Portland, OR (booknews.com)

Synopsis:

HP-UX 11i Security is the industry's most authoritative, comprehensive guide to securing HP-UX hosts. From powerful new HP-UX 11i security features to leading public-domain security tools, no other book offers as much HP-UX-specific security guidance.

Synopsis:

This book is designed to give the system administrator the skills required to successfully secure an HP-UX system. Readers will also have detailed information on how to install and use public-domain security products on HP-UX.

About the Author

CHRIS WONG has worked on HP systems since the mid-1980s. She is a HP Certified Technical Professional/Consultant on HP-UX 11, the HP e3000, High Availability, System Consolidation, and the XP. She is also a HP OpenView Certified Consultant and Integration Expert. Currently, she is a technical consultant for Cerius Technology Group, an HP Channel Partner.

Table of Contents

Foreword.

Preface.

1. Ready or Not, Here I Come!

Attacks. What Is Needed to Compromise a System? Ten Ways To Become root. What Can Happen When the System Is Compromised? Protection. A Letter to the CIO. Policies.

2. Passwords, Users, and Groups.

The password File. The Group File. Tools. Security Risk of the /etc/passwd File. Trusted System. Trusted Systems and Tools. Password Policies. What Makes a Good Password? Passwords and Multiple Hosts. User Management. Group Maintenance. Writing Scripts. The /etc/default/security File.

3. Disks, File Systems, and Permissions.

Disks. Logical Volume Manager. VERITAS Volume Manager. File Systems. The mount Command. File Permissions. Access Control Lists. The chatr Command and the Executable Stack. Quotas. The NAS and SAN.

4. System Access.

The Internet Daemon. Modems. The /etc/dialups and /etc/d_passwd Files. Secure Web Console. Physical Access and Boot Authentication. Guardian Service Processor. Restrictions for Users.

5. Multi-Host Environments.

The “r” Commands. SSH. NIS. NIS+. LDAP. DNS and BIND. DHCP. NFS. CIFS/9000.

6. Distributing root Privileges.

SUID/SGID Scripts and Programs. Restricted SAM. Sudo. ServiceControl Manager. OpenView. Comparison of Tools.

7. ServiceControl Manager.

Installation of the Central Management Server. Adding Nodes to the SCM Cluster. ServiceControl Manager Graphical User Interface. Adding Users. Role Assignments. Tools. Argument Limitations. Web Interface. SCM Log Files. SCM and Security. Why Use SCM?

8. Internet Daemon Services.

The Internet Daemon Startup. /etc/inetd.conf File. /etc/services File. /etc/protocols File. /var/adm/inetd.sec File. Understanding Socket Connections. Tcpwrappers. Telnet. File Transfer Protocol. Anonymous FTP. Trivial FTP. Finger. Other Internet Services. Running Other Services from inetd.

9. Kerberos.

What is Kerberos Doing? Installing Kerberos. Configuring Kerberos. Kerberos Utilities. Kerberos and HP-UX 10.20. Kerberos and rlogin. Kerberos and the -P Option. More about PAM.

10. IPSec/9000.

IPSec Configuration. What Is Happening? IPSec Tunnel Mode. Using IPSec/9000 as a Firewall. IP Number and Mask. Managing Keys on IPSec/9000.

11. Monitoring System Activity.

syslog Daemon. The syslog File. The btmp File. The wtmp File. The /etc/utmp File. The sulog File. The rc.log File. Shell History. Open Source Log Tools and Utilities. Log Rotation. Auditing. Accounting. Utilizing Performance Data. Monitoring System Resources. Managing System Resources.

12. Monitoring System Changes.

System Configuration Repository. Tripwire.

13. NetAction.

HP VirtualVault. Extranet VPN. HP Speedcard. HP PKI. Intrusion Detection System/9000.

14. Building a Bastion Host by Kevin Steves.

What Is a Bastion Host? Methodology. Sample Blueprint.

15. Checklist, Security Patches, and Miscellaneous Topics.

The Checklist. The HP-UX Security Patch Check Tool. The HP-UX Security Book Web Site. Continuing Your Knowledge. Mail. Protecting Your System Against “Ten Ways to Become root”. The Bastille Hardening System. IPFilter/9000.

Index.

Product Details

ISBN:
9780130330628
Author:
Wong, Chris
Publisher:
Prentice Hall
Location:
Upper Saddle River, NJ
Subject:
Programming - General
Subject:
Networking - General
Subject:
Operating Systems - UNIX
Subject:
Computer networks
Subject:
Computer security
Subject:
Security
Subject:
Hewlett-Packard computers
Subject:
Linux
Subject:
UNIX
Subject:
TCP/IP
Subject:
Security - General
Subject:
Operating Systems - General
Subject:
Hewlett-Packard computers -- Programming.
Subject:
Networking-Computer Security
Copyright:
Edition Description:
Trade paper
Series:
HP Professional Series
Series Volume:
v. 7
Publication Date:
September 2001
Binding:
TRADE PAPER
Grade Level:
Professional and scholarly
Language:
English
Illustrations:
Yes
Pages:
480
Dimensions:
9 x 7 x 1.2 in 739 gr

Other books you might like

  1. Hacknotes Windows Security Portable...
    Used Trade Paper $6.95
  2. Windows Server 2003 Security Bible...
    New Trade Paper $25.00
  3. Backup Book: Disaster Recovering... Used Trade Paper $6.25
  4. Auditing and Security: AS/400, NT,... New Hardcover $179.75
  5. Upgrading and Repairinb Laptop... Used Hardcover $27.00
  6. 101 Microsoft Visual Basic .Net... Used Trade Paper $5.95

Related Subjects

Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General
Computers and Internet » Operating Systems » General
Computers and Internet » Operating Systems » Unix » Unix Administration
Computers and Internet » Operating Systems » Unix » Unix Flavors

HP-UX 11i Security (Hewlett-Packard Professional Books) New Trade Paper
0 stars - 0 reviews
$50.75 Backorder
Product details 480 pages Prentice Hall PTR - English 9780130330628 Reviews:
"Synopsis" by , HP-UX 11i Security is the industry's most authoritative, comprehensive guide to securing HP-UX hosts. From powerful new HP-UX 11i security features to leading public-domain security tools, no other book offers as much HP-UX-specific security guidance.
"Synopsis" by , This book is designed to give the system administrator the skills required to successfully secure an HP-UX system. Readers will also have detailed information on how to install and use public-domain security products on HP-UX.

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.