Register your product to gain access to bonus material or receive a coupon.
This book provides a comprehensive source for features, capabilities, how to instructions, security recommendations, and best practices for securing systems using the Solaris Security Toolkit software. Securing computer systems against unauthorized access is one of the most pressing issues facing today's data center administrators. As with any security decision, a balance must be attained between system manageability and security. Many attacks have preventative solutions available; however, every day, hackers compromise systems using well-known attack methods. Using the software, tools, recommendations, and best practices presented in this book to harden systems and minimize entry points to intruders can increase security of your systems.
Deploying the Solaris Operating Environment Using a Solaris Security Toolkit CD
Maximizing the Performance a Gigabit Ethernet NIC Interface
Responding to a Customer's Security Incidents, Part 4: Processing Incident Data
Responding to Customer's Security Incidents, Part 1: Establishing Teams and a Policy
Responding to Customer's Security Incidents—Part 2: Executing a Policy
Responding to Customer's Security Incidents--Part 3: Following Up After an Incident
Securing Linux Systems With Host-Based Firewalls Implemented With Linux iptables
Securing Sun Linux Systems: Part I, Local Access and File Systems
Securing Sun Linux Systems: Part II, Network Security
Securing the Sun Cluster 3.x Software
Securing the Sun Fire 12K and 15K Domains
Securing the Sun Fire 12K and 15K System Controllers
Securing Web Applications through a Secure Reverse Proxy
Sun Cluster 3.0 Series: Guide to Installation—Part 2
Using Midframe Servers to Build Secure Sun Fire Link Interconnect Networks
Installing and Running Security Software for Sun Solaris
Download the Sample Chapter related to this title.