This text discusses the preventive methods designed to help systems personnel to avoid potential security leaks when using the AS/400 as a server. The text is practical, focusing on recovery strategies, and case studies illustrate various scenarios. The accompanying disk contains a variety of security auditing and anti-virus programs, which will provide the reader with ready-to-use programs so they can create their own secure methods.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
" The Author, in considerable detail, shows the various vulnerabilities of the AS/400 system, and also indicates various approaches to their cure. Through examples and case studies that read like detective stories, this book explains why the AS/400 represents such a tempting target to hackers, bugs and virus. If you are involved with an IBM AS/400 system used as a server, this book is for you." -- George McGinnis; Cryptolog; Vol. 22; No. 1; Winter 2001
This text discusses the preventive methods designed to help systems personnel to avoid potential security leaks when using the AS/400 as a server. The text is practical, focusing on recovery strategies, and case studies illustrate various scenarios. The accompanying disk contains a variety of security auditing and anti-virus programs, which will provide the reader with ready-to-use programs so they can create their own secure methods.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 22,26 für den Versand von USA nach Deutschland
Versandziele, Kosten & DauerAnbieter: Bookmans, Tucson, AZ, USA
Hardcover. Zustand: Acceptable. Some light wear. Includes diskette. Satisfaction 100% guaranteed. Bestandsnummer des Verkäufers mon0002021875
Anzahl: 1 verfügbar