Sun Certified Security Administrator for Solaris 9 & 10 Study Guide

Paperback
from $0.00

Author: John Chirillo

ISBN-10: 0072254238

ISBN-13: 9780072254235

Category: Solaris / Sun OS

Get the book that shows you not only what—but how—to study\ \ Complete coverage of all official exam objectives\ Exam Readiness checklist at the front of the book—you’re ready for the exams when all objectives on the list are checked off\ Real-world exercises—Step-by-step instruction modeled after the hands-on exam questions\ Inside the Exam sections in every chapter highlight key exam topics covered\ Simulated exam questions match the format, tone, topics, and difficulty of the real exams\...

Search in google:

Get the book that shows you not only what—but how—to study Complete coverage of all official exam objectives Exam Readiness checklist at the front of the book—you’re ready for the exams when all objectives on the list are checked off Real-world exercises—Step-by-step instruction modeled after the hands-on exam questions Inside the Exam sections in every chapter highlight key exam topics covered Simulated exam questions match the format, tone, topics, and difficulty of the real examsCovers all Sun Certified Security Administrator topics, including:Attacks, Motives, and Methods • Best Security Practices • Logging and Process Accounting • Auditing, Planning, and Management • Device, System, and File Security • Denial of Service and Remote Access Attacks • Access Control • Solaris Cryptographic Framework • Authentication • Secure ShellThe best fully integrated study system available. CD-ROM includes: Complete MasterExam practice testing engine, featuring: One full practice exam Detailed answers with explanations Score Report performance assessment tool Electronic book for studying on the gowith free online registration: Bonus downloadable MasterExam practice testAbout the Authors: John Chirillo, CISSP, ISSAP, CCNP, ASE, SCSA, is a Senior Internetworking Engineer at ValCom and the author of several computer security books. Edgar Danielyan, CISSP, CIW, Security+, CCNA, CCDP, CWNA, is a Solaris security expert and author.About the AuthorJohn Chirillo, CISSP, ISSAP, ASE, CCDA, CCNA, CCNP, SCSECA, is a Senior Internetworking Engineer at ValCom and the author of several computer security books. John has also achieved certifications in numerous programming languages and is responsible for dozens of published security exploits and alerts throughout numerous listings. He has actively participated in core security developments of various UNIX flavors under the GNU. John can be reached at tiger@tigertools.net.About the Co-AuthorEdgar Danielyan, CISSP, ISSAP, ISSMP, CISA, MBCS, SCSA, SCNA, is Information Systems Audit Manager with Deloitte & Touche in the city of London. Before joining Deloitte, he had been an independent security consultant since 1999. He is also the author of Solaris 8 Security (New Riders, 2001) and technical editor of a number of books on Solaris, security, UNIX, and internetworking. His personal web site can be found at www.danielyan.com.About the Technical EditorTom Brays, SCSA, SCNA, SCSECA, MCP, is a network administrator for a large telecommunications firm and the technical editor and contributing author of several computer books. He can be reached at tombrays@techie.comAbout LearnKeyLearnKey provides self-paced learning content and multimedia delivery solutions to enhahce personal skills and business productivity. LearnKey claims the largest library of rich streaming-media training content that engages learners in dynamic media-rch instruction complete with video clips, audio, full motion graphics, and animated illustrations. LearnKey can be found on the Web at www.LearnKey.com.

1Fundamental security concepts32Attacks, motives, and methods353Security management and standards654Logging and process accounting955Solaris auditing, planning, and management1216Device, system, and file security1517Denial of service attacks1798Remote access attacks2179User and domain account management with RBAC25510Fundamentals of access control28111Using cryptographic services30512Secure RPC across NFS and PAM33313SASL and secure shell35514Sun enterprise authentication mechanism375