• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • AS/400 Security in a Client/Server Environment: Twelve Keys for Living

    AS/400 Security in a Client/Server Environment by Park, Joseph S.;

    Twelve Keys for Living

      • 10% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár GBP 44.50
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        21 259 Ft (20 247 Ft + 5% áfa)
      • Kedvezmény(ek) 10% (cc. 2 126 Ft off)
      • Kedvezményes ár 19 133 Ft (18 222 Ft + 5% áfa)

    21 259 Ft

    Beszerezhetőség

    A kiadónál véglegesen elfogyott, nem rendelhető. Érdemes újra keresni a címmel, hátha van újabb kiadás.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    A termék adatai:

    • Kiadó John Wiley & Sons
    • Megjelenés dátuma 1995. augusztus 8.

    • ISBN 9780471116837
    • Kötéstípus Puhakötés
    • Terjedelem290 oldal
    • Méret 232x190x19 mm
    • Súly 539 g
    • Nyelv angol
    • 0

    Kategóriák

    Rövid leírás:

    Networking/AS/400

    Timely, effective security for the AS/400(r)


    It may be hard to believe, but the AS/400 is not tamperproof, despite IBM's design efforts to that end. Consequently, the growing popularity of this system as a server means a greater security risk for everyone who uses it. AS/400 Security in a Client/Server Environment shows how to mount the strongest possible defense against security breaks in the AS/400, and how to recover quickly when they do occur.


    This readable, user-friendly book cuts through many commonly held misconceptions about security in general, and the AS/400 in particular. Through examples and case studies that read like detective stories, this book explains why the AS/400 represents such a tempting target to hackers, how bugs and viruses can be inserted into the system, and what preventive methods and techniques can fight them.


    This book provides the tools for bolstering the security of the AS/400 without restricting the normal functioning of the organization that is using it, including:



    • Pointers on how to plan ahead for security problems when using the AS/400 as a server

    • A 31

    • 2" diskette containing security auditing and antivirus programs that clean up AS/400 bugs and viruses

    • Figures and tables that illustrate the connection between design and potential threat

    • Easily adaptable auditing procedures and technical recommendations

    • Details of security weaknesses in the AS/400 system

    • A complete overview of AS/400 security, from resource authorization models to today's client/server environments


    AS/400 Security in a Client/Server Environment provides a complete guide for IT managers; systems developers, designers, analysts, and programmers; and database developers and administrators, as well as anyone interested in the wider context of the AS/400's evolution.

    Több

    Hosszú leírás:

    Networking/AS/400

    Timely, effective security for the AS/400(r)


    It may be hard to believe, but the AS/400 is not tamperproof, despite IBM's design efforts to that end. Consequently, the growing popularity of this system as a server means a greater security risk for everyone who uses it. AS/400 Security in a Client/Server Environment shows how to mount the strongest possible defense against security breaks in the AS/400, and how to recover quickly when they do occur.


    This readable, user-friendly book cuts through many commonly held misconceptions about security in general, and the AS/400 in particular. Through examples and case studies that read like detective stories, this book explains why the AS/400 represents such a tempting target to hackers, how bugs and viruses can be inserted into the system, and what preventive methods and techniques can fight them.


    This book provides the tools for bolstering the security of the AS/400 without restricting the normal functioning of the organization that is using it, including:



    • Pointers on how to plan ahead for security problems when using the AS/400 as a server

    • A 31

    • 2" diskette containing security auditing and antivirus programs that clean up AS/400 bugs and viruses

    • Figures and tables that illustrate the connection between design and potential threat

    • Easily adaptable auditing procedures and technical recommendations

    • Details of security weaknesses in the AS/400 system

    • A complete overview of AS/400 security, from resource authorization models to today's client/server environments


    AS/400 Security in a Client/Server Environment provides a complete guide for IT managers; systems developers, designers, analysts, and programmers; and database developers and administrators, as well as anyone interested in the wider context of the AS/400's evolution.



    " The Author, in considerable detail, shows the various vulnerabilities of the AS/400 system, and also indicates various approaches to their cure. Through examples and case studies that read like detective stories, this book explains why the AS/400 represents such a tempting target to hackers, bugs and virus. If you are involved with an IBM AS/400 system used as a server, this book is for you."

    -- George McGinnis; Cryptolog; Vol. 22; No. 1; Winter 2001

    Több

    Tartalomjegyzék:

    MANAGEMENT.

    The Assault.


    System Values.


    User Profiles.


    Object Management.


    Communication Management.


    Client/Server Issues.


    Object States and Domains.


    Impact of Altered Objects.


    Program Validation Values.


    The Core War.


    IMPLEMENTATION.


    Physical Security.


    System Values.


    Designing Profiles.


    Authority Management.


    Backup and Recovery.


    AUDITING.


    System Values.


    User Profiles.


    Resource Usage Audit.


    Soul of a Hacker.


    Appendix.


    Bibliography.


    Index.

    Több
    Mostanában megtekintett
    previous
    AS/400 Security in a Client/Server Environment: Twelve Keys for Living

    MACHINE MANAGEMENT USING PRECISION AGRICULTURE: DE

    FAGGION, FRANCISCO; CORREIA, TIAGO PEREIRA DA SILVA;

    18 207 Ft

    17 297 Ft

    next