Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mac OS X Security

Buy
Mac OS X Security, 9780735713482 (0735713480), New Riders Publishing, 2003
Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.

This book is about security. Specifically, it is about understanding security issues with Mac OS X. From the basic framework of the operating system, to host-based security, to integration into an enterprise network, this book covers it all.

Mac OS X is a powerful operating system. It contains new security features that go above and beyond previous versions of Mac OS. There are keychains to store passwords. Disk volumes can be encrypted so other users cannot read your data. Permissions on files and directories can be controlled on a user and group basis. It is interoperable with more industry standards and operating systems than previous versions of Mac OS ever aspired to. With NetInfo, large-scale users and resource management is reality. Mac OS X systems can be integrated into enterprise directory services, such as Active Directory and Apple's own Open Directory for management of users and resources.

Mac OS X is also more dangerous to use than previous Apple operating systems if not installed and configured correctly. Without understanding how various configuration files and commands alter the state of the machine, a user can quickly break down any security barriers that existed in the default install and leave themselves open to attack.

We will not only cover the tools and security issues, but also provide practical application and configurations where needed. By the end of this book, you will understand how to defend and audit a Mac OS X installation and how to avoid common mistakes that can expose you to security risks.

(HTML tags aren't allowed.)

DBA Transformations: Building Your Career in the Transition to On-Demand Cloud Computing and Extreme Automation
DBA Transformations: Building Your Career in the Transition to On-Demand Cloud Computing and Extreme Automation
A book like this has been a long time coming. Being a DBA is not an easy calling – especially in today’s world. There was a time when DBAs were prized keepers of data within organizations. What we did was a mystery to most, but the role was somewhat predictable. With the introduction of IaaS, PaaS, SaaS, machine...
Operative Microsurgery
Operative Microsurgery

MASTER COMMON AND DIFFICULT MICROSURGERY PROCEDURES WITH STEP-BY-STEP, ILLUSTRATED GUIDANCE

More than 2,000 full-color photographs and illustrations!

Operative Microsurgery is a practical, full-color procedural guide that focuses on microsurgery of the upper and lower limbs, nerves and brachial plexus,...

Herpes Zoster: Recent Aspects of Diagnosis and Control (Monographs in Virology)
Herpes Zoster: Recent Aspects of Diagnosis and Control (Monographs in Virology)
Herpes zoster is a serious neurocutaneous disease which has been underestimated in terms of its burden, particularly in the elderly population. The overall incidence of herpes zoster in Europe is about 3 per 1,000 people and more than 10 per 1,000 people per year aged more than 80 years. Due to the growing life expectancy of the...

Building Secure Microsoft ASP.NET Applications: Authentication, Authorization, and Secure Communication
Building Secure Microsoft ASP.NET Applications: Authentication, Authorization, and Secure Communication

Building secure distributed Web applications can be challenging. It usually involves integrating several different technologies and products—yet your complete application will only be as secure as its weakest link. This guide presents a practical, scenario-driven approach to designing and building secure ASP.NET applications for...

Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown...

Aerodynamics of Wind Turbines
Aerodynamics of Wind Turbines

Aerodynamics of Wind Turbines is the established essential text for the fundamental solutions to efficient wind turbine design. Now in its second edition, it has been entirely updated and substantially extended to reflect advances in technology, research into rotor aerodynamics and the structural response of the wind turbine structure.
...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy