HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Publishers of technology books, eBooks, and videos for creative people
Register your product to gain access to bonus material or receive a coupon.
Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.
Selecting a Secure Enterprise OS: Don't Make the First Step the Wrong Step
WiFi Device Discovery: Tips and Techniques
Mac OS X Client General Security Practices
Sample Chapter - 585 kb - Chapter 3 - Mac OS X Client General Security Practices
Table Of Contents - 51 kb - 0735713480T.pdf