Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Maximum Mac OS X Security

Buy
Maximum Mac OS X Security, 9780672323812 (0672323818), Sams Publishing, 2003

While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.

Yet most Mac OS X books are generally quite simplistic -- with the exception of the author's Mac OS X Unleashed, the first book to address OS X's underlying BSD subsystem.

Maximum Mac OS X Security takes a similar UNIX-oriented approach, going into significantly greater depth on OS X security topics:

* Setup basics, including Airport and network topology security.
* User administration and resource management with NetInfo.
* Types of attacks, how attacks work, and how to stop them.
* Network service security, such as e-mail, Web, and file sharing.
* Intrusion prevention and detection, and hands-on detection tools.

About the Author

John Ray is an award-winning developer and technology consultant with more than 17 years of programming and network administration experience. He has worked on projects for the FCC, The Ohio State University, Xerox, and the State of Florida, as well as serving as IT Director for a Columbus, Ohiobased design and application development company. John currently serves as Senior System Developer/Engineer for The Ohio State University Extension and provides network security and intrusion detection services for clients across the state and country. His first experience in security was an experimental attempt to crack a major telecom company. Although he was successful, the resulting attention from individuals in trench coats made him swear off working on the "wrong side" of the keyboard forever.

John has written or contributed to more than 12 titles currently in print, including Mac OS X Unleashed and Maximum Linux Security.

Dr. William Ray is a mathematician turned computer scientist turned biophysicist who has gravitated to the field of bioinformatics for its interesting synergy of logic, hard science, and human-computer-interface issues. A longtime Macintosh and Unix enthusiast, Will has owned Macs since 1985, and has worked with Unix since 1987. Prior to switching his professional focus to the biological sciences, Will spent five years as a Unix programmer developing experimental interfaces to online database systems. He left this position when his desktop workstation was cracked, then used to attack other businesses' computers. The incompetence of his employer's system administrators resulted in his being accused of perpetrating the attacks, and a series of visits from the men in trenchcoats, nice suits, and dark glasses for him as well. As a result, Will has developed an enduring disgust for employers, system administrators, and users who don't take system security, and their responsibilities with respect to it, seriously.

(HTML tags aren't allowed.)

Lysophospholipid Receptors: Signaling and Biochemistry
Lysophospholipid Receptors: Signaling and Biochemistry

The current state of the science supporting new research in lysophospholipids

The study of lysophospholipids exploded with the discovery of cell surface receptors on both lysophosphatidic acid (LPA) and sphingosine 1-phosphate (S1P). Since then, thousands of original research reports—ranging from fundamental cell...

MATLAB Programming for Numerical Analysis
MATLAB Programming for Numerical Analysis

MATLAB is a high-level language and environment for numerical computation, visualization, and programming. Using MATLAB, you can analyze data, develop algorithms, and create models and applications. The language, tools, and built-in math functions enable you to explore multiple approaches and reach a solution faster than with spreadsheets or...

Levine's Guide to SPSS for Analysis of Variance: Second Edition
Levine's Guide to SPSS for Analysis of Variance: Second Edition
In the decade since the publication of the first edition of this guide (Levine, 1991), and despite the development of several more specialized statistical techniques, analysis of variance (ANOVA) continues to be the workhorse for many behavioral science researchers. This guide provides instructions and examples for running analyses of variance, as...

Hybrid Learning: 4th International Conference, ICHL 2011, Hong Kong, China, August 10-12, 2011
Hybrid Learning: 4th International Conference, ICHL 2011, Hong Kong, China, August 10-12, 2011

Welcome to the 4th International Conference on Hybrid Learning (ICHL 2011). After spending ICHL 2010 at the Beijing Normal University and ICHL 2009 at University of Macau, we are back to Hong Kong with our new host, The University of Hong Kong’s School of Professional and Continuing Education (HKU SPACE).

...

Schaum's Outline of Digital Signal Processing (Schaum's)
Schaum's Outline of Digital Signal Processing (Schaum's)

Master digital signal processing with Schaum's­­the high-performance study guide. It will help you cut down on study time, hone problem-solving skills, and achieve your personal best on exams. Students love Schaum's Outlines because they produce results. Each year, hundreds of thousands of students improve their test scores and final...

Getting Started in Speaking, Training, or Seminar Consulting
Getting Started in Speaking, Training, or Seminar Consulting

How to make a living speaking, training, and running workshops and seminars

Expert Bob Bly shares his secrets for earning $1,000 to $5,000 a day, or more, as a self-employed speaker, lecturer, or trainer. He shows readers, step-by-step, everything they need to know to become polished speakers, create winning presentations,
...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy