Automating Solaris Installations


Book Description

Focusing exclusively on JumpStart--the installation software provided with the Solaris operating environment for SPARC and X86--this book/disk package explains all the steps necessary to automate Solaris installations, describes the Solaris installation process in detail, and provides begin and finish installation scripts that can be adapted to configure systems automatically.




Solaris System Administrator's Guide


Book Description

Introducing Solaris system administrator's; Using basic OS commands; Administering devices; Administering file systems; Administering network services; Administering printing; Administering user accounts and groups; Understanding shells; Administering systems; Recognizing file acess problems; Major differences: SunOS 4.x versus SunOS 5.x operating systems.




SSH, The Secure Shell: The Definitive Guide


Book Description

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.




Network Security Assessment


Book Description

Covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping you design and deploy networks that are immune to offensive exploits, tools, and scripts. Chapters focus on the components of your network, the different services yourun, and how they can be attacked. Each chapter concludes with advice to network defenders on how to beat the attacks.




Configuring and Tuning Databases on the Solaris Platform


Book Description

Covers key performance issues related to using leading databases on Sun servers for system administrators and database programmers. This book brings together best-practice guidelines for every aspect of database tuning on Sun servers.




Guide to Solaris


Book Description

Long-time UNIX expert John Pew brings beginning users of the Solaris system software into the fold and opens new avenues of power and productivity to more experienced users. Covers the Open Windows environment comprehensively and explains in detail how to use all of the DeskSet tools. Shows how to work from the command line of the SunOS operating environment.




AUUGN


Book Description




Solaris 8 Advanced System Administrator's Guide


Book Description

As the son of two Jungian therapists, the young Micah Toub got a double dose of insight, ranging from the flaky to the profound. Dreamwork, archetypes, conflict resolution, the mind-body connection--Toub's childhood was a virtual laboratory of psychology. Enriched with excerpts from Carl Jung's own memoir, and informed by readings and conversations with Jungian gurus and unbelievers alike, Growing Up Jung examines the pros and cons of Jungian philosophy while tackling the question: is it possible for the spawn of two shrinks to reach adulthood mentally unscathed?




AUUGN


Book Description




Mastering Solaris 2


Book Description

Here's a comprehensive guide to SunSoft's UNIX-based operating environment. Learn to work under OpenWindows 3.0, use the graphical DeskSet tools, and use essential system commands for file management, text editing, security, e-mail, and more.