PAM Mastery. IT Mastery, #10
Par :Formats :
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
- Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
- Compatible avec une lecture sur liseuses Vivlio
- Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement
Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
- FormatePub
- ISBN978-1-386-76621-6
- EAN9781386766216
- Date de parution27/06/2017
- Protection num.pas de protection
- Infos supplémentairesepub
- ÉditeurRelay Publishing
Résumé
Pluggable Authentication Modules: Threat or Menace?PAM is one of the most misunderstood parts of systems administration. Many sysadmins live with authentication problems rather than risk making them worse. PAM's very nature makes it unlike any other Unix access control system. If you have PAM misery or PAM mysteries, you need PAM Mastery!With PAM Mastery, you'll understand:.the different versions of PAM.the intricacies of Linux-PAM and OpenPAM.how PAM policies make decisions.how to debug PAM.the most frequently seen PAM modules.Linux-PAM extended controls and substacks.time-based one-time passwords.using SSH keys for more than SSH.password quality testing.policies from CentOS, Debian, and FreeBSD.and more!Transform PAM from a headache to an ally with PAM Mastery
Pluggable Authentication Modules: Threat or Menace?PAM is one of the most misunderstood parts of systems administration. Many sysadmins live with authentication problems rather than risk making them worse. PAM's very nature makes it unlike any other Unix access control system. If you have PAM misery or PAM mysteries, you need PAM Mastery!With PAM Mastery, you'll understand:.the different versions of PAM.the intricacies of Linux-PAM and OpenPAM.how PAM policies make decisions.how to debug PAM.the most frequently seen PAM modules.Linux-PAM extended controls and substacks.time-based one-time passwords.using SSH keys for more than SSH.password quality testing.policies from CentOS, Debian, and FreeBSD.and more!Transform PAM from a headache to an ally with PAM Mastery