HP Nonstop server security a practical handbook

Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing HP NonStop servers. Emphasis is pl...

Full description

Bibliographic Details
Main Author: Hill, Terri
Other Authors: Alvarado, Ellen
Format: eBook
Language:English
Published: Amsterdam Elsevier Digital Press 2004
Series:HP Technologies
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 06274nmm a2200565 u 4500
001 EB001924854
003 EBX01000000000000001087756
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780080491493 
020 |a 9781555583149 
020 |a 0080491499 
020 |a 1281007110 
020 |a 9781281007117 
020 |a 9786611007119 
020 |a 1555583148 
050 4 |a QA76.9.A25 
100 1 |a Hill, Terri 
245 0 0 |a HP Nonstop server security  |b a practical handbook  |c Terri Hill, Ellen Alvarado 
246 3 1 |a Hewlett-Packard nonstop server security 
260 |a Amsterdam  |b Elsevier Digital Press  |c 2004 
300 |a xxxxiv, 616 pages 
505 0 |a EDIT User Program -- EMS Subsystem -- EMSA Subsystem -- ENABLE User Program -- ENFORM Subsystem -- ERROR User Program -- Expand Subsystem -- FINGER System Utility -- File Transfer Protocols -- FUP System Utility -- INSPECT Subsystem -- Libraries, SRLs and Common Routines -- Licensed Files -- LISTNER System Utility -- LOGIN System Program -- LOGON User Program -- MEASURE Subsystem -- Native Link Editor (NLD) User Program -- Native Object File Tool (NOFT) User Program -- NETBATCH Subsystem -- NSKCOM System Utility -- Operating System -- PAK/UNPAK User Programs -- Password User Program -- Pathway Subsystem -- PCFORMAT User Program -- PEEK System Utility -- PING User Program -- PROGID'd Files -- PUP System Utility -- NonStop RDF Subsystem -- RESTORE User Program -- RPASSWRD User Program -- Safeguard Subsystem -- Subsystem Control Facility (SCF) -- Subsystem Control Point (SCP) -- SEEVIEW User Program -- SORT Subsystem -- Subsystem Programmatic Interface (SPI) --T. 
505 0 |a CMON -- Chapter 5. Authorization-Object Security -- Defining User Access to System Resources -- Guardian Process Security -- Securing Processes With the Safeguard Subsystem -- Device Security -- The File Subsystem -- Securing Diskfiles In the Guardian Environment -- Securing Disk Files With the Safeguard Subsystem -- Chapter 6. Gazette A to Z -- ADDUSER User Program -- AUDSERV System Program -- AXCEL User Program -- BACKCOPY System Utility -- BACKUP User Program -- Binder Subsystem -- BUSCMD System Utility -- $CMON System Program -- Compilers -- COUP System Utility -- CROSSREF User Program -- *CSTM Customization Files -- Data Build User Program -- DATA Loader/MP User Program -- DCOM System Utility -- Data Definition Language (DDL) Subsystem -- DEFAULT User Program -- DELUSER User Program -- Disk Processes -- DISKGEN System Utility -- Distributed Name Service (DNS) Subsystem -- DIVER System Utility -- DSAP User Program -- DSM/SCM Subsystem -- DSM/TC Subsystem -- ECHO User Program --  
505 0 |a Cover -- Copyright Page -- Contents -- Foreword -- Preface -- Introduction -- About This Handbook -- Applying the Security -- Chapter 1. Security Basics -- Importance of Corporate Security Policies and Standards -- Information Security -- Controlling Access to Systems and Resources -- Compliance Monitoring and Documentation -- Chapter 2. The HP NonStop Server Architecture and Environment -- Understanding the Architecture -- HP NonStop Networking -- Guardian Personality -- Configuring the Safeguard Subsystem -- Chapter 3. Authentication; User Administration -- User Administration -- Privileged IDs -- Personal Userids -- Managing Userids In the Guardian System -- Managing Userids With the Safeguard Subsystem -- Auditing Users -- Password Administration -- Password-Related Logon Controls -- Chapter 4. Authentication, Granting Access to the HP NonStop Server -- Guardian Authentication -- OSS Authentication -- Safeguard-Controlled Terminals -- Granting Access to the Remote Nodes --  
653 |a Computer security 
653 |a COMPUTERS / Internet / Security / bisacsh 
653 |a Sécurité informatique 
653 |a Hewlett-Packard (Ordinateurs) / Sécurité / Mesures 
653 |a Hewlett-Packard computers / Security measures 
653 |a Client/server computing / Security measures 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a Architecture client-serveur (Informatique) / Sécurité / Mesures 
653 |a Computer security / fast 
653 |a Computer Security 
653 |a COMPUTERS / Security / General / bisacsh 
700 1 |a Alvarado, Ellen 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a HP Technologies 
500 |a "XYPRO Technology Corporation"--Cover. - "TM" [trademark] appears after Nonstop in title. - Includes index. - Title from book cover on Web Page (viewed December 6, 2005). - Title from title screen 
500 |a May be limited to subscribing institutions 
776 |z 1555583148 
776 |z 9780080491493 
776 |z 0080491499 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781555583149/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing HP NonStop servers. Emphasis is placed on explaining security risks and best practices relevant to NonStop environments, and how to deploy native security tools (Guardian and Safeguard). All third party vendors who supply security solutions relevant to NonStop servers are listed, along with contact information for each vendor. The Handbook is a source for critical information to NonStop professionals and NonStop security administrators in particular. However, it is written in such a way as to also be extremely useful to readers new to the NonStop platform and to information security. This handbook familiarizes auditors and those responsible for security configuration and monitoring with the aspects of the HP NonStop server operating system that make the NonStop Server unique, the security risks these aspects create, and the best ways to mitigate these risks. Addresses the lack of security standards for the NonStop server Provides information robust enough to train more security-knowledgeable staff The ideal accompaniment to any new HP NonStop system