Sun Certified Security Administrator for Solaris 9 & 10 Study Guide / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Paperback)
  • All (13) from $1.99   
  • New (3) from $38.94   
  • Used (10) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$38.94
Seller since 2007

Feedback rating:

(23167)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
BRAND NEW

Ships from: Avenel, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$39.04
Seller since 2009

Feedback rating:

(112)

Condition: New
New Book from multilingual publisher. Shipped from UK within 4 to 14 business days. Please check language within??the description. Established seller since 2000.

Ships from: Fairford, United Kingdom

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$40.36
Seller since 2014

Feedback rating:

(29)

Condition: New
All orders ship same business day via standard shipping (USPS Media Mail) if received by 4 PM CST. We do not ship to APO/FPO addresses.

Ships from: Richardson, TX

Usually ships in 1-2 business days

  • Standard, 48 States
Page 1 of 1
Showing All
Close
Sort by

Overview

Get the book that shows you not only what—but how—to study

  • Complete coverage of all official exam objectives
  • Exam Readiness checklist at the front of the book—you’re ready for the exams when all objectives on the list are checked off
  • Real-world exercises—Step-by-step instruction modeled after the hands-on exam questions
  • Inside the Exam sections in every chapter highlight key exam topics covered
  • Simulated exam questions match the format, tone, topics, and difficulty of the real exams

Covers all Sun Certified Security Administrator topics, including:

Attacks, Motives, and Methods
• Best Security Practices
• Logging and Process Accounting
• Auditing, Planning, and Management
• Device, System, and File Security
• Denial of Service and Remote Access Attacks
• Access Control
• Solaris Cryptographic Framework
• Authentication
• Secure Shell

The best fully integrated study system available. Electronic content includes:

  • Complete MasterExam practice testing engine, featuring:
  • One full practice exam
  • Detailed answers with explanations
  • Score Report performance assessment tool
  • Electronic book for studying on the go

with free online registration:

  • Bonus downloadable MasterExam practice test

About the Authors:

John Chirillo, CISSP, ISSAP, CCNP, ASE, SCSA, is a Senior Internetworking Engineer at ValCom and the author of several computer security books. Edgar Danielyan, CISSP, CIW, Security+, CCNA, CCDP, CWNA, is a Solaris security expert and author.

Read More Show Less

Product Details

  • ISBN-13: 9780072254235
  • Publisher: McGraw-Hill Professional Publishing
  • Publication date: 6/14/2005
  • Series: Certification Press Series
  • Edition number: 1
  • Pages: 538
  • Product dimensions: 7.10 (w) x 9.10 (h) x 1.50 (d)

Meet the Author

About the Author

John Chirillo, CISSP, ISSAP, ASE, CCDA, CCNA, CCNP, SCSECA, is a Senior Internetworking Engineer at ValCom and the author of several computer security books. John has also achieved certifications in numerous programming languages and is responsible for dozens of published security exploits and alerts throughout numerous listings. He has actively participated in core security developments of various UNIX flavors under the GNU. John can be reached at tiger@tigertools.net.

About the Co-Author

Edgar Danielyan, CISSP, ISSAP, ISSMP, CISA, MBCS, SCSA, SCNA, is Information Systems Audit Manager with Deloitte & Touche in the city of London. Before joining Deloitte, he had been an independent security consultant since 1999. He is also the author of Solaris 8 Security (New Riders, 2001) and technical editor of a number of books on Solaris, security, UNIX, and internetworking. His personal web site can be found at www.danielyan.com.

About the Technical Editor

Tom Brays, SCSA, SCNA, SCSECA, MCP, is a network administrator for a large telecommunications firm and the technical editor and contributing author of several computer books. He can be reached at tombrays@techie.com

About LearnKey

LearnKey provides self-paced learning content and multimedia delivery solutions to enhahce personal skills and business productivity. LearnKey claims the largest library of rich streaming-media training content that engages learners in dynamic media-rch instruction complete with video clips, audio, full motion graphics, and animated illustrations. LearnKey can be found on the Web at www.LearnKey.com.

Read More Show Less

Table of Contents

1 Fundamental security concepts 3
2 Attacks, motives, and methods 35
3 Security management and standards 65
4 Logging and process accounting 95
5 Solaris auditing, planning, and management 121
6 Device, system, and file security 151
7 Denial of service attacks 179
8 Remote access attacks 217
9 User and domain account management with RBAC 255
10 Fundamentals of access control 281
11 Using cryptographic services 305
12 Secure RPC across NFS and PAM 333
13 SASL and secure shell 355
14 Sun enterprise authentication mechanism 375
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)