Summary
@SUMMARY = Key
Benefits This guide provides the reader with best practices from Sun
Microsystems for architecting multi-tiered datacenter environments. Key
Topics This Sun Microsystems Blue Print features documented,
automated, and supported security best practices for high-end servers and
cluster software. Written for experienced developers and system administrators
it includes tricks, tools, and techniques that hackers use to break into
systems. The author details best practices and tools for sniffing out "trojaned"
system files and binaries and describes Solaris security features, network
settings, and minimization. Market This book is targeted at
developers and system administrators.
Table of
Contents
Acknowledgements.
Preface.
I. SOLARIS OPERATING ENVIRONMENT SECURITY.
1. Solaris Operating Environment Security.
2. Network Settings for
Security.
3. Minimization.
4. Auditing.
II. ARCHITECTURE SECURITY.
5. Building Secure N-Tier Environments.
III. JUSTIFICATION FOR SECURITY.
6. How Hackers Do It: Tricks, Tools, and Techniques.
IV. TOOLS SECURITY.
7. Solaris Fingerprint Database.
V. HARDWARE AND SOFTWARE SECURITY.
8. Securing the Sun Fire 15K System Controller.
9. Securing Sun Fire
15K Domains.
10. Securing Sun Enterprise 10000 System Service Processors.
11. Sun Cluster 3.0 (12/01) Security with the Apache and iPlanet Web and
Messaging Agents.
12. Securing the Sun Fire Midframe System Controller.
VI. SOLARIS SECURITY TOOLKIT DOCUMENTATION.
13. Quick Start.
14. Installation, Configuration, and User Guide.
15. Internals.
16. Release Notes.
Index.