Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Solaris Security

Solaris Security

List Price: $39.99
Your Price:
Product Info Reviews

<< 1 2 >>

Rating: 2 stars
Summary: You already know it !
Review: If you have 2 years Unix experience you already know the contents. Doesn't have have tricks&hints. It gives good reference to look forward on the web or other books. Save your money ...

Rating: 1 stars
Summary: The lowest amazon will allow is 1 star.
Review: Substandard security book. Perhaps Peter H. Gregory is AKA Janice Winsor

Rating: 5 stars
Summary: System and Security Admins in Large Enterp. Need this.
Review: The Solaris Security book is very well laid out, easy to read, and has information every Solaris admin and security admin needs to know. I've been working with many different versions of Unix and even though I'm not new to Solaris, I found this book helpful by being able to find the reference or background knowledge quickly. If you're lucky enough to work with only Solaris 100% of the time then maybe this book won't knock your socks off - but I'd still recommend it as a reference book and to pass around to your co-workers. Having the references to other sources makes it feel more realistic by getting other points of view and for other priorities (such as having a checklist, more in-depth on networking, etc). I give it 5 stars for the best Solaris Security book in print.

Rating: 2 stars
Summary: Very basic, riddled with errors and typos
Review: They should have named this book "Beginning Solaris Administration with a touch of Security". This book presents basic system administration techniques, many of them extremely obvious or simple common sense. Security is glossed over very quickly with little to no 'meat'. "We recommend running COPS or Tiger to audit this weakness, see Chapter 4." Chapter 4 includes a one paragraph note on COPS.

In addition to the lack of any real content, like all recent computer books, author continually comments on blocking port 43 at the firewall to prevent DNS queries and zone transfers. Everyone knows that DNS uses port 53--in fact, the author notes that in a table 10 pages earlier. I would just attribute this to a typo, but he mentions port 43 at least 5 times on one page.

I expected better of SUN and Prentice-Hall, but I guess I should have known better based on the Janice Winsor books. [This review refers to the 1st printing]

Rating: 2 stars
Summary: Very basic, riddled with errors and typos
Review: They should have named this book "Beginning Solaris Administration with a touch of Security". This book presents basic system administration techniques, many of them extremely obvious or simple common sense. Security is glossed over very quickly with little to no 'meat'. "We recommend running COPS or Tiger to audit this weakness, see Chapter 4." Chapter 4 includes a one paragraph note on COPS.

In addition to the lack of any real content, like all recent computer books, author continually comments on blocking port 43 at the firewall to prevent DNS queries and zone transfers. Everyone knows that DNS uses port 53--in fact, the author notes that in a table 10 pages earlier. I would just attribute this to a typo, but he mentions port 43 at least 5 times on one page.

I expected better of SUN and Prentice-Hall, but I guess I should have known better based on the Janice Winsor books. [This review refers to the 1st printing]

Rating: 1 stars
Summary: Only touches surface and is outdated
Review: This book gives only a bird's view of Solaris security - with many important concepts missing and much unnecessary information which most UNIX administrators know. On the same time it is outdated (published in 1999), and it does not cover many new features in Solaris 8, the current release of Solaris.

Rating: 3 stars
Summary: Decent High Level Intro
Review: This book is a decent intro to security on a Solaris system. If you are a new Solaris admin, this book is a great read. It does cover a lot of topics from a high level, so it is lacking on a lot of practicals. It will give you a decent idea of where you to go. A good starting point, but you need to get into some other security books to get the nitty gritty details.

Rating: 5 stars
Summary: great breadth of security issues, not for experts
Review: When the book title is "Solaris security" and not "Hacking exposed" one can probably expect a decent level. Not true.

The book can probably be partially useful for beginning Unix administrators, but in no way it can be considered a Solaris Security book.

First of all the useful content is almost absent. If you skip first 23 pages and appendixes you might find that you have bought less than 150 horribly typeset pages of general information useful only for beginning Solaris sysadmins, if any.

The quality of the book can be illustrated by the folowing quote (preface, page XLI): ftp://ftp.win.tne.nl/pub/security/tcp_wrappers_7.6tar.gz

This archive was compromised more than two years ago and is now defunct so putting such URL in the book looks unprofessional. And the value of this recommendation is pretty obvious.

Aset is covered in just one page. COPS in one-half, Tiger -- one half, Tripwire in one. None of the modern tools are covered at all. After that statistic one might wonder why the book is called Solaris security. Well, that's probably gives you an idea.

I agree completely with the review of the reader from New Hampshire, but taking into account that the foreword was written by Steven M. Bellovin I would give it one star instead of two.

Rating: 1 stars
Summary: A very superficial book. Aviod it
Review: When the book title is "Solaris security" and not "Hacking exposed" one can probably expect a decent level. Not true.

The book can probably be partially useful for beginning Unix administrators, but in no way it can be considered a Solaris Security book.

First of all the useful content is almost absent. If you skip first 23 pages and appendixes you might find that you have bought less than 150 horribly typeset pages of general information useful only for beginning Solaris sysadmins, if any.

The quality of the book can be illustrated by the folowing quote (preface, page XLI): ftp://ftp.win.tne.nl/pub/security/tcp_wrappers_7.6tar.gz

This archive was compromised more than two years ago and is now defunct so putting such URL in the book looks unprofessional. And the value of this recommendation is pretty obvious.

Aset is covered in just one page. COPS in one-half, Tiger -- one half, Tripwire in one. None of the modern tools are covered at all. After that statistic one might wonder why the book is called Solaris security. Well, that's probably gives you an idea.

I agree completely with the review of the reader from New Hampshire, but taking into account that the foreword was written by Steven M. Bellovin I would give it one star instead of two.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates