My Account Details

ISBN10: 0072254238 | ISBN13: 9780072254235

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Get the book that shows you not only what--but how--to study Complete coverage of all official exam objectives Exam Readiness checklist at the front of the book--you’re ready for the exams when all objectives on the list are checked off Real-world exercises--Step-by-step instruction modeled after the hands-on exam questions Inside the Exam sections in every chapter highlight key exam topics covered Simulated exam questions match the format, tone, topics, and difficulty of the real exams Covers all Sun Certified Security Administrator topics, including:Attacks, Motives, and Methods * Best Security Practices * Logging and Process Accounting * Auditing, Planning, and Management * Device, System, and File Security * Denial of Service and Remote Access Attacks * Access Control * Solaris Cryptographic Framework * Authentication * Secure Shell The best fully integrated study system available. Electronic content includes: Complete MasterExam practice testing engine, featuring: One full practice exam Detailed answers with explanations Score Report performance assessment tool Electronic book for studying on the go with free online registration: Bonus downloadable MasterExam practice test About the Authors: John Chirillo, CISSP, ISSAP, CCNP, ASE, SCSA, is a Senior Internetworking Engineer at ValCom and the author of several computer security books. Edgar Danielyan, CISSP, CIW, Security+, CCNA, CCDP, CWNA, is a Solaris security expert and author.
About the ContributorsAcknowledgmentsPrefaceIntroductionPart I: General Security ConceptsChapter 1: Fundamental Security ConceptsChapter 2: Attacks, Motives, and MethodsChapter 3: Security Management and StandardsPart II: Detection and Device ManagementChapter 4: Logging and Process AccountingChapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
PrefaceIntroductionPart I: General Security ConceptsChapter 1: Fundamental Security ConceptsChapter 2: Attacks, Motives, and MethodsChapter 3: Security Management and StandardsPart II: Detection and Device ManagementChapter 4: Logging and Process AccountingChapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part I: General Security ConceptsChapter 1: Fundamental Security ConceptsChapter 2: Attacks, Motives, and MethodsChapter 3: Security Management and StandardsPart II: Detection and Device ManagementChapter 4: Logging and Process AccountingChapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Chapter 2: Attacks, Motives, and MethodsChapter 3: Security Management and StandardsPart II: Detection and Device ManagementChapter 4: Logging and Process AccountingChapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part II: Detection and Device ManagementChapter 4: Logging and Process AccountingChapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Chapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Chapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Chapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Chapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Appendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Appendix D: Hands-On Exercises and SolutionsIndex
Need support? We're here to help - Get real-world support and resources every step of the way.