Home > Articles > Operating Systems, Server > Solaris

  • Print
  • + Share This
Like this article? We recommend

Related Resources

Publications

  • Anderson, Ross J. Security Engineering, A Guide to Building Dependable Distributed Systems, Wiley 2001, ISBN 0-471-38922-6.

  • Brunette, Glenn, Hullhorst, Michael, and Weijers, G . "Securing Sun Linux Systems, Part I, Local Access and File Systems," Sun BluePrints OnLine, July 2003, http://www.sun.com/solutions/blueprints/0703/817-3420.pdf.

  • Brunette, Glenn, Hullhorst, Michael, and Weijers, G . "Securing Sun Linux Systems, Part II, Network Security," Sun BluePrints OnLine, July 2003, http://www.sun.com/solutions/blueprints/0703/817-3421.pdf.

  • Englund, Martin. "Securing Systems with Host-based Firewalls - Implemented With SunScreen™ Lite 3.1 Software," Sun BluePrints OnLine, September 2001, http://www.sun.com/solutions/blueprints/0901/sunscreenlite.pdf.

  • Rekter, Y., et. al. Address Allocation for Private Internets, RFC 1918.

  • Zwicky, Elizabeth D., Cooper, Simon, and Chapman, Brent D. Building Internet Firewalls, O'Reilly 2000, ISBN 1-56592-871-7.

Web Sites

NOTE

Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused by or in connection with the use of or reliance on any such content, goods, or services that are available on or through such sites or resources.

  • + Share This
  • 🔖 Save To Your Account