Pluggable Authentication Modules: the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, U.K.
Packt Pub.
2007
|
Schriftenreihe: | From technologies to solutions
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from title screen. - Includes index "First this book explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It shows in detail how PAM works and how it is configured. Then 11 common modules used across UNIX/Linux distributions are examined and explained, including all their parameters. Installation of third-party modules is discussed, and the development of new modules and PAM-aware applications is outlined"--Resource description p |
Beschreibung: | 1 Online-Ressource |
ISBN: | 1847190227 1904811329 9781847190222 9781904811329 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043098767 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 1847190227 |c electronic bk. |9 1-84719-022-7 | ||
020 | |a 1904811329 |9 1-904811-32-9 | ||
020 | |a 9781847190222 |c electronic bk. |9 978-1-84719-022-2 | ||
020 | |a 9781904811329 |9 978-1-904811-32-9 | ||
020 | |a 9781904811329 |9 978-1-904811-32-9 | ||
035 | |a (OCoLC)251947158 | ||
035 | |a (DE-599)BVBBV043098767 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Geisshirt, Kenneth |e Verfasser |4 aut | |
245 | 1 | 0 | |a Pluggable Authentication Modules |b the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them |c Kenneth Geisshirt ; reviewers, Ralf Hildebrandt, Huang Zhen ; technical editor, Mithil Kulkarni |
264 | 1 | |a Birmingham, U.K. |b Packt Pub. |c 2007 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a From technologies to solutions | |
500 | |a Title from title screen. - Includes index | ||
500 | |a "First this book explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It shows in detail how PAM works and how it is configured. Then 11 common modules used across UNIX/Linux distributions are examined and explained, including all their parameters. Installation of third-party modules is discussed, and the development of new modules and PAM-aware applications is outlined"--Resource description p | ||
630 | 0 | 4 | |a Linux |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Linux |2 blmlsh | |
650 | 7 | |a Computer security / Software |2 blmlsh | |
650 | 7 | |a Computer networks / Security measures / Software |2 blmlsh | |
650 | 7 | |a Computer security / Software |2 local | |
650 | 7 | |a Computer networks / Security measures / Software |2 local | |
650 | 7 | |a Linux |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security |v Software | |
650 | 4 | |a Computer networks |x Security measures |v Software | |
650 | 0 | 7 | |a UNIX |0 (DE-588)4061835-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programm |0 (DE-588)4047394-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Framework |g Informatik |0 (DE-588)4464685-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 1 | |a Framework |g Informatik |0 (DE-588)4464685-9 |D s |
689 | 0 | 2 | |a UNIX |0 (DE-588)4061835-3 |D s |
689 | 0 | 3 | |a Programm |0 (DE-588)4047394-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Hildebrandt, Ralf |e Sonstige |4 oth | |
700 | 1 | |a Zhen, Huang |e Sonstige |4 oth | |
700 | 1 | |a Kulkarni, Mithil |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=268070 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028522958 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=268070 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=268070 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175506535350272 |
---|---|
any_adam_object | |
author | Geisshirt, Kenneth |
author_facet | Geisshirt, Kenneth |
author_role | aut |
author_sort | Geisshirt, Kenneth |
author_variant | k g kg |
building | Verbundindex |
bvnumber | BV043098767 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)251947158 (DE-599)BVBBV043098767 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03680nmm a2200721zc 4500</leader><controlfield tag="001">BV043098767</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1847190227</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84719-022-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1904811329</subfield><subfield code="9">1-904811-32-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781847190222</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84719-022-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781904811329</subfield><subfield code="9">978-1-904811-32-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781904811329</subfield><subfield code="9">978-1-904811-32-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)251947158</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043098767</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Geisshirt, Kenneth</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Pluggable Authentication Modules</subfield><subfield code="b">the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them</subfield><subfield code="c">Kenneth Geisshirt ; reviewers, Ralf Hildebrandt, Huang Zhen ; technical editor, Mithil Kulkarni</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, U.K.</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">From technologies to solutions</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen. - Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"First this book explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It shows in detail how PAM works and how it is configured. Then 11 common modules used across UNIX/Linux distributions are examined and explained, including all their parameters. Installation of third-party modules is discussed, and the development of new modules and PAM-aware applications is outlined"--Resource description p</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Linux</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Software</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures / Software</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Software</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures / Software</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Software</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">UNIX</subfield><subfield code="0">(DE-588)4061835-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programm</subfield><subfield code="0">(DE-588)4047394-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Framework</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4464685-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Framework</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4464685-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">UNIX</subfield><subfield code="0">(DE-588)4061835-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Programm</subfield><subfield code="0">(DE-588)4047394-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hildebrandt, Ralf</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhen, Huang</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kulkarni, Mithil</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=268070</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028522958</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=268070</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=268070</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043098767 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:22Z |
institution | BVB |
isbn | 1847190227 1904811329 9781847190222 9781904811329 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028522958 |
oclc_num | 251947158 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Packt Pub. |
record_format | marc |
series2 | From technologies to solutions |
spelling | Geisshirt, Kenneth Verfasser aut Pluggable Authentication Modules the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them Kenneth Geisshirt ; reviewers, Ralf Hildebrandt, Huang Zhen ; technical editor, Mithil Kulkarni Birmingham, U.K. Packt Pub. 2007 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier From technologies to solutions Title from title screen. - Includes index "First this book explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It shows in detail how PAM works and how it is configured. Then 11 common modules used across UNIX/Linux distributions are examined and explained, including all their parameters. Installation of third-party modules is discussed, and the development of new modules and PAM-aware applications is outlined"--Resource description p Linux COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Linux blmlsh Computer security / Software blmlsh Computer networks / Security measures / Software blmlsh Computer security / Software local Computer networks / Security measures / Software local Linux fast Computer networks / Security measures fast Computer security fast Computer security Software Computer networks Security measures Software UNIX (DE-588)4061835-3 gnd rswk-swf Programm (DE-588)4047394-6 gnd rswk-swf Framework Informatik (DE-588)4464685-9 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 s Framework Informatik (DE-588)4464685-9 s UNIX (DE-588)4061835-3 s Programm (DE-588)4047394-6 s 1\p DE-604 Hildebrandt, Ralf Sonstige oth Zhen, Huang Sonstige oth Kulkarni, Mithil Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=268070 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Geisshirt, Kenneth Pluggable Authentication Modules the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them Linux COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Linux blmlsh Computer security / Software blmlsh Computer networks / Security measures / Software blmlsh Computer security / Software local Computer networks / Security measures / Software local Linux fast Computer networks / Security measures fast Computer security fast Computer security Software Computer networks Security measures Software UNIX (DE-588)4061835-3 gnd Programm (DE-588)4047394-6 gnd Framework Informatik (DE-588)4464685-9 gnd Authentifikation (DE-588)4330656-1 gnd |
subject_GND | (DE-588)4061835-3 (DE-588)4047394-6 (DE-588)4464685-9 (DE-588)4330656-1 |
title | Pluggable Authentication Modules the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them |
title_auth | Pluggable Authentication Modules the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them |
title_exact_search | Pluggable Authentication Modules the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them |
title_full | Pluggable Authentication Modules the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them Kenneth Geisshirt ; reviewers, Ralf Hildebrandt, Huang Zhen ; technical editor, Mithil Kulkarni |
title_fullStr | Pluggable Authentication Modules the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them Kenneth Geisshirt ; reviewers, Ralf Hildebrandt, Huang Zhen ; technical editor, Mithil Kulkarni |
title_full_unstemmed | Pluggable Authentication Modules the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them Kenneth Geisshirt ; reviewers, Ralf Hildebrandt, Huang Zhen ; technical editor, Mithil Kulkarni |
title_short | Pluggable Authentication Modules |
title_sort | pluggable authentication modules the definitive guide to pam for linux sysadmins and c developers a comprehensive and practical guide to pam for linux how modules work and how to implement them |
title_sub | the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them |
topic | Linux COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Linux blmlsh Computer security / Software blmlsh Computer networks / Security measures / Software blmlsh Computer security / Software local Computer networks / Security measures / Software local Linux fast Computer networks / Security measures fast Computer security fast Computer security Software Computer networks Security measures Software UNIX (DE-588)4061835-3 gnd Programm (DE-588)4047394-6 gnd Framework Informatik (DE-588)4464685-9 gnd Authentifikation (DE-588)4330656-1 gnd |
topic_facet | Linux COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security / Software Computer networks / Security measures / Software Computer networks / Security measures Computer security Computer security Software Computer networks Security measures Software UNIX Programm Framework Informatik Authentifikation |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=268070 |
work_keys_str_mv | AT geisshirtkenneth pluggableauthenticationmodulesthedefinitiveguidetopamforlinuxsysadminsandcdevelopersacomprehensiveandpracticalguidetopamforlinuxhowmodulesworkandhowtoimplementthem AT hildebrandtralf pluggableauthenticationmodulesthedefinitiveguidetopamforlinuxsysadminsandcdevelopersacomprehensiveandpracticalguidetopamforlinuxhowmodulesworkandhowtoimplementthem AT zhenhuang pluggableauthenticationmodulesthedefinitiveguidetopamforlinuxsysadminsandcdevelopersacomprehensiveandpracticalguidetopamforlinuxhowmodulesworkandhowtoimplementthem AT kulkarnimithil pluggableauthenticationmodulesthedefinitiveguidetopamforlinuxsysadminsandcdevelopersacomprehensiveandpracticalguidetopamforlinuxhowmodulesworkandhowtoimplementthem |