O'Reilly logo

HP-UX CSE Official Study Guide and Desk Reference by Charles Keenan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter THIRTY. A New Breed of Security Tools

Chapter Syllabus

  • 30.1 The Basics of Cryptography, Including Symmetric and Asymmetric Key Cryptography

  • 30.2 Secure Shell (SSH)

  • 30.3 Host Intrusion Detection System (HIDS)

  • 30.4 IPSec, Diffie-Hellman, and Modular Arithmetic

  • 30.5 IPFilter and Bastille

  • 30.6 Other Security-Related Terms

In this chapter, we look at some of the new tools available to the HP-UX administrator to help secure and manage an HP-UX system. These tools range from Secure Shell to encryption technologies allowing us to secure all our applications over an IP network. Many of these tools are new. We briefly look at them in operation and discuss when and if their use may be appropriate. It must be said that we cannot afford detailed discussions ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required