Sun Certified Security Administrator for Solaris 9 & 10 Study Guide
Step 1. Download Adobe Digital Editions Both PC and Mac users will need to download Adobe Digital Editions to access their eBook. You can download Adobe Digital Editions at Adobe's website here.
Step 2. Register an Adobe ID if you do not already have one. (This step is optional, but allows you to open the file on multiple devices) Visit account.Adobe.com to register your Adobe account.
Step 3: Authorize Adobe Digital Editions using your Adobe ID. In Adobe Digital Editions, go to the Help menu. Choose “Authorize Computer.”
Step 4: Open your file with Adobe Digital Editions. Once you’ve linked your Adobe Digital Editions with your Adobe ID, you should be able to access your eBook on any device which supports Adobe Digital Editions and is authorized with your ID. If your eBook does not open in Adobe Digital Editions upon download, please contact customer service
About the ContributorsAcknowledgmentsPrefaceIntroductionPart I: General Security ConceptsChapter 1: Fundamental Security ConceptsChapter 2: Attacks, Motives, and MethodsChapter 3: Security Management and StandardsPart II: Detection and Device ManagementChapter 4: Logging and Process AccountingChapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
PrefaceIntroductionPart I: General Security ConceptsChapter 1: Fundamental Security ConceptsChapter 2: Attacks, Motives, and MethodsChapter 3: Security Management and StandardsPart II: Detection and Device ManagementChapter 4: Logging and Process AccountingChapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part I: General Security ConceptsChapter 1: Fundamental Security ConceptsChapter 2: Attacks, Motives, and MethodsChapter 3: Security Management and StandardsPart II: Detection and Device ManagementChapter 4: Logging and Process AccountingChapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Chapter 2: Attacks, Motives, and MethodsChapter 3: Security Management and StandardsPart II: Detection and Device ManagementChapter 4: Logging and Process AccountingChapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part II: Detection and Device ManagementChapter 4: Logging and Process AccountingChapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Chapter 5: Solaris Auditing, Planning, and ManagementChapter 6: Device, System, and File SecurityPart III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part III: Security AttacksChapter 7: Denial of Service AttacksChapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Chapter 8: Remote Access AttacksPart IV: File and System Resources ProtectionChapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Chapter 9: User and Domain Account Management with RBACChapter 10: Fundamentals of Access ControlPart V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part V: Solaris Cryptographic FrameworkChapter 11: Using Cryptographic ServicesPart VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part VI: Authentication Services and Secure CommunicationChapter 12: Secure RPC Across NFS and PAMChapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Chapter 13: SASL and Secure ShellChapter 14: Sun Enterprise Authentication MechanismPart VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Part VII: AppendicesAppendix A: Final Test Study GuideAppendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Appendix B: Final TestAppendix C: Final Test AnswersAppendix D: Hands-On Exercises and SolutionsIndex
Appendix D: Hands-On Exercises and SolutionsIndex
Get the book that shows you not only what--but how--to study
- Complete coverage of all official exam objectives
- Exam Readiness checklist at the front of the book--you’re ready for the exams when all objectives on the list are checked off
- Real-world exercises--Step-by-step instruction modeled after the hands-on exam questions
- Inside the Exam sections in every chapter highlight key exam topics covered
- Simulated exam questions match the format, tone, topics, and difficulty of the real exams
Covers all Sun Certified Security Administrator topics, including: Attacks, Motives, and Methods * Best Security Practices * Logging and Process Accounting * Auditing, Planning, and Management * Device, System, and File Security * Denial of Service and Remote Access Attacks * Access Control * Solaris Cryptographic Framework * Authentication * Secure Shell
The best fully integrated study system available. Electronic content includes:
- Complete MasterExam practice testing engine, featuring:
- One full practice exam
- Detailed answers with explanations
- Score Report performance assessment tool
- Electronic book for studying on the go
with free online registration:
- Bonus downloadable MasterExam practice test
About the Authors: John Chirillo, CISSP, ISSAP, CCNP, ASE, SCSA, is a Senior Internetworking Engineer at ValCom and the author of several computer security books. Edgar Danielyan, CISSP, CIW, Security+, CCNA, CCDP, CWNA, is a Solaris security expert and author.