Solaris 10 Security Essentials and over 2 million other books are available for Amazon Kindle . Learn more
£23.92
  • RRP: £27.99
  • You Save: £4.07 (15%)
FREE Delivery in the UK.
Temporarily out of stock.
Order now and we'll deliver when available. We'll e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged when we dispatch the item.
Dispatched from and sold by Amazon.
Gift-wrap available.
Quantity:1
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Solaris 10 Security Essentials (Solaris System Administration) Paperback – 9 Nov 2009


See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
£23.92
£20.74 £20.73

Trade In Promotion



Product details


Product Description

From the Back Cover

Solaris10 Security Essentials describes the various security technologies contained in the Solaris operating system. The book describes how to make installations secure and how to configure the OS to the particular needs of your environment, whether your systems are on the edge of the Internet or running a data center. The authors present the material in a straightforward way that makes a seemingly arcane subject accessible to system administrators at all levels.

 

The strengths of the Solaris operating system’s security model are its scalability and its adaptability. It can protect a single user with login authentication or multiple users with Internet and intranet configurations requiring user-rights management, authentication, encryption, IP security, key management, and more. This book is written for users who need to secure their laptops, network administrators who must secure an entire company, and everyone in between.

 

The book’s topics include

  • Zones virtualization security
  • System hardening
  • Trusted Extensions (Multi-layered Security)
  • Privileges and role-based access control (RBAC)
  • Cryptographic services and key management
  • Auditing
  • Network security
  • Pluggable Authentication Modules (PAM)

Solaris10 Security Essentials is the first in a new series on Solaris system administration. It is a superb guide to deploying and managing secure computer environments.

About the Author

This book is the work of the engineers, architects, and writers at Sun Microsystems who conceptualized the services, wrote the procedures, and coded the Solaris OS’s security features. These authors bring a vast range of industry and academic experience to the business of creating and deploying secure operating systems. Authors include Glenn Brunette, Hai-May Chao, Martin Englund, Glenn Faden, Mark Fenwick, Valerie Anne Fenwick, Wyllys Ingersoll, Wolfgang Ley, Darren Moffat, Pravas Kumar Panda, Jan Pechanec, Mark Phalan, Darren Reed, Scott Rotondo, Christoph Schuba, Sharon Read Veach, Joep Vesseur, and Paul Wernau.

Customer Reviews

There are no customer reviews yet on Amazon.co.uk.
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 4 reviews
2 of 2 people found the following review helpful
Solid and helpful introduction to the subject 3 Aug 2010
By Michael Ernest - Published on Amazon.com
Format: Paperback Verified Purchase
As I mentioned in my review of Solaris 10 System Administration Essentials, I bought the two books together. I read the other book first and was disappointed by the hand-waving treatment of important topics and sometimes outdated concepts. I also felt misled by the author attribution. While it was my mistake to infer Sun engineers had written the book, "Solaris System Engineers" still misrepresents many of that book's contributors. If I had written that content and dared call myself a system engineer, I'd imagine my employer would want to know what I mean by that phrase, followed by a quiet resignation.

Thankfully, this book is quite different. It is, for starters, attributed to "Sun Microsystems Security Engineers" and there's no mistaking that by the quality of the content. The first two chapters present exactly what I think such a volume should include, namely, a motivation for the subject and an example-driven overview of all the aspects of security that enter into administering this operatiing system. These chapters are simple, clear, and set a solid foundation that makes the sometimes-dry content to follow easier to digest.

The chapters that follow could be longer, but I think the content mostly delivers on the "essentials" idea. The treatments aren't comprehensive, but they're enough to get started in several areas and explore what the Solaris tools make possible. Chapter 3, "System Protection with SMF," highlights a few aspects of Solaris' Service Management Facility that are often overlooked, and provides useful examples the reader can work through. I also liked Chapter 5, "Privileges and Role-Based Access Control," despite the 4-5 unnecessary screen shots of Solaris Management Console. This topic often gets mired in half-finished explanations of the configuration components. Here the roles of these components are laid out in a deliberate, patient manner that makes it easier to connect the dots.

Most software engineers are not great writers. The easiest thing for many of them to do, it seems, is to transliterate from design documents and/or code to an exposition of features and possibly how they are implemented. Some chapters follow that dull, dry pattern. A beginner, grateful for any kind of help, might not mind. But an editor who insists the writer dig deeper for the intended audience would have helped a lot here. A detail-heavy topic like Chapter 10, "Solaris 10 Network Security," tends to suffer from too much show and not enough tell. The imbalance is strongest in Chapter 8, "Key Management Framework," which is all of nine pages -- closer to "skeletal" than "essential" but oh well. In fact, if you read in order, starting with Chapter 6, "Pluggable Authentication Modules (PAM)" and Chapter 7, "Solaris Cryptographic Framework," you can almost hear the breathing get more labored as you go. The going generally gets tougher to the end. The last chapter, "Configuring and Using Trusted Extensions," is welcome relief from that trend, but it would also benefit from a discussion that motivates the reader: is it potentially useful? How? If it's merely cool to a lot of users, that's ok to me, but please do tell me what fun I'm missing.

Overall, the information provided in this book is strong and useful. It is certainly more accessible than a lot of existing documentation. On price: if I could save $15 or more by printing the PDF of the book, I would happily live without the binding and the nice cover. With that in mind, I wouldn't pay retail for this book, which I find a shade too thin.
Solaris can be made harder 16 April 2014
By Husto - Published on Amazon.com
Format: Paperback Verified Purchase
A very good starting place to further harden an obserdly hard operating system. For those that have an interest in IT security, this is another useful point of referrence -- Microsoft types waste not your time, this far and beyond what you all think of security.
Good book 4 Aug 2014
By leonard S Culpepper - Published on Amazon.com
Format: Paperback Verified Purchase
Good book
4 of 8 people found the following review helpful
Essential 21 Nov 2009
By Trinity - Published on Amazon.com
Format: Paperback
Just as it says on the cover, it's essential. I've had it for a couple days and now I can't live without it. It's answered so many nagging questions. Yay Solaris!
Were these reviews helpful? Let us know


Feedback