Flylib.com
Index_L
Previous page
Table of content
Next page
L
Legacy applications, 52425
LIB parameter, 134
Libraries
components , securing, 32627
defined, 322
SCF, 416
shared run-time (SRLs), 32426
system, 323
user , 32324
uses, 32223
LICENSE command, 334
Licensed files, 32736
documentation/authorization of, 329
risks, 328
securing, 32836
unauthorized, scheduled review for, 33536
Licensed operating system programs, 33034
LINKMON, 375
LISTNER utility, 33639
components, 337
defined, 336
multiple processes, 336
PORTCONF configuration file, 33738
responsibility, 336
securing, 33839
TCP/IP service file, 338
LOAD, 257
Location-independent naming, 442
Logical controls, 810
Logical Device Numbers, 163
LOGIN program, 33940
defined, 339
securing, 33940
Logon
CMON configuration, 130
non-Safeguard, 128
password issues, 130
with Safeguard, 129
Safeguard Global parameters, 13031
TACLCONF configuration, 12730
Logon controls
password- related , 11224
Safeguard, 11314
settings, 113
LOGON program, 112, 34041
defined, 340
securing, 34041
Previous page
Table of content
Next page
HP NonStop Server Security 2004
ISBN: 159059035X
EAN: N/A
Year: 2004
Pages: 157
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Reverse Engineering and Importing to ORM
Creating a Basic Logical Database Model
Generating a Physical Database Schema
Editing Logical Models”Intermediate Aspects
Other Features and Best Practices
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Oracle Advanced SELECT Options
Optimizing: The Crystal Reports Side
Optimizing: The Oracle Side
Data Dictionary Report
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Scope Risk
Quantifying and Analyzing Activity Risks
Closing Projects
Appendix A Selected Detail From the PERIL Database
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Cable
VoIP
Marking
Traffic Shaping
Trunking
The Complete Cisco VPN Configuration Guide
When to Use SSL VPNs
Concentrator Remote Access Connections with IPsec
Concentrator Site-to-Site Connections
Windows Software Client
Configuring the Windows VPN Client
Ruby Cookbook (Cookbooks (OReilly))
Partitioning or Classifying a Set
Controlling Access by Making Methods Private
Metaprogramming with String Evaluations
Compressing and Archiving Files with Gzip and Tar
Doing Two Things at Once with Threads
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies