The Practice of System and Network AdministrationSharing the unique beauty and history of the Southwest had always delighted Rainy Gordon, and now as a tour guide for the Harvey House Detours, she's given ample opportunity. When the colorful array of well-to-do guests includes a famous movie actor, she is surprised to find his attentions are drawn her way. She is equally intrigued when Duncan Hartford accompanies her trips as a driver trainee. But the past she's left behind threatens to haunt her again when she becomes a suspect in an investigation of stolen Indian artifacts. As evidence continues to mount against her, Rainy fears for her job - and her heart, as well. |
From inside the book
Results 1-3 of 69
Page 134
... person the computer believes it has authenticated is actually that person and not someone else using that person's credentials . For example , a strong authentication system may be a biometric mechanism or it may simply be a token ...
... person the computer believes it has authenticated is actually that person and not someone else using that person's credentials . For example , a strong authentication system may be a biometric mechanism or it may simply be a token ...
Page 655
... person you look for should have the remaining skills . We tend to find ourselves mostly hiring senior - level SAs in such large quantities that we almost exclusively " hire the person . " We only recommend " hiring the skill " in ...
... person you look for should have the remaining skills . We tend to find ourselves mostly hiring senior - level SAs in such large quantities that we almost exclusively " hire the person . " We only recommend " hiring the skill " in ...
Page 705
... person who stalls on the use of any new technology . This person is risk - averse . Sometimes she has a favorite excuse , such as not being satisfied with the back - out plan . She is happy with the current OS release , the current OS ...
... person who stalls on the use of any new technology . This person is risk - averse . Sometimes she has a favorite excuse , such as not being satisfied with the back - out plan . She is happy with the current OS release , the current OS ...
Other editions - View all
Common terms and phrases
able applications attacks auditing authentication automated AutoPatch back-out plan backup basic Bell Labs building central change management chapter client components configuration connections console console server cost critical customers data center database debugging delete deployed desktop DHCP disaster recovery plan discussed disk documentation e-commerce engineering environment example file server firewall flight director happen hardware helpdesk host hot-swap implemented incident response infrastructure installation Internet involved IP address LDAP load machine room maintenance window monitoring namespace outage password performance person print server problem protection protocols reboot redundant reliability rely remote access requests risk router schedule script Section security group security team SMTP Solaris someone system administration tasks things typically UNIX updates upgrade users vendor
References to this book
Firewalls e sicurezza in rete William R. Cheswick,Steven M. Bellovin,Aviel D. Rubin No preview available - 2003 |