Download Now Free registration required
Proper configuration management is vital for host and network security. The authors outline the problems, especially for large-scale environments, and discuss the security aspects of a number of different configuration scenarios, including security appliances (e.g., firewalls), desktop and server computers, and PDAs. They conclude by discussing research challenges. Computer systems require configuration. This is obvious to anyone who has used even the simplest consumer-grade machines, which demand that one supply their name and the computer's name when they are first unpacked.
- Format: PDF
- Size: 621.54 KB