|
|
libcats.org
Foundations of Mac OS X Leopard SecurityZack Smith, William Barker, Charles EdgeКнига Foundations of Mac OS X Leopard Security Foundations of Mac OS X Leopard SecurityКниги Mac OS Автор: Charles Edge, William Barker, Zack Smith Год издания: 2008 Формат: pdf Издат.:Apress Страниц: 488 Размер: 22 Язык: Русский0 (голосов: 0) Оценка:Foundations of Mac OS X Leopard Security by Charles Edge (Author), William Barker (Author), Zack Smith (Author)488 pages - Publisher: Apress (April 28, 2008)Product DescriptionFoundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish thebest practices” for Mac OS X for a wide audience. Additionally, the authors of the book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DefCon and Black Hat on OS X security.What you’ll learnSecurity overviewWalkthroughs to secure systemsWalkthroughs and suggestions for third–party applications on systemsMac forensicsMac hackingApple wireless securityMac OS X securityWho is this book for?A wide audience of users, power users, and administrators who wish to make sure their Mac platform is secure.Contents at a Glance:PART 1 ■ ■ ■ The Big Picture■CHAPTER 1 Security Quick-Star■CHAPTER 2 Security Fundamental■CHAPTER 3 Securing User AccountsPART 2 ■ ■ ■ Security Essentials■CHAPTER 4 Malware Security: Combating Viruses, Worms, and Root Kits■CHAPTER 5 Securing Web Browsers and E-mail■CHAPTER 6 Reviewing Logs and MonitoringPART 3 ■ ■ ■ Network Security■CHAPTER 7 Securing Network Traffic■CHAPTER 8 Setting Up the Mac OS X Firewall■CHAPTER 9 Securing a Wireless NetworkPART 4 ■ ■ ■ Sharing■CHAPTER 10 File Services■CHAPTER 11 Web Site Security■CHAPTER 12 Remote Connectivity■CHAPTER 13 Server SecurityPART 5 ■ ■ ■ Workplace Security■CHAPTER 14 Network Scanning, Intrusion Detection, and Intrusion Prevention Tools■CHAPTER 15 Backup and Fault Tolerance■CHAPTER 16 Forensics■APPENDIX A Xsan Security■APPENDIX B Acceptable Use Policy■APPENDIX C Secure Development■APPENDIX D Introduction to
Популярные книги за неделю:
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Только что пользователи скачали эти книги:
Intelligent Systems in Process Engineering, Part II: Paradigms from Process Operations, Volume 22 (Advances in Chemical Engineering)Автор: George Stephanopoulos, Автор: Chonghun Han, Автор: John L. Anderson
Размер книги: 15.12 Mb
The Existence of GodАвтор: Richard SwinburneКатегория: Academic books, Theology
Размер книги: 2.77 Mb
Parliamentary Socialisation: Learning the Ropes or Determining Behaviour? (Understanding Governance)Автор: Michael Rush, Автор: Philip Giddings
Размер книги: 2.69 Mb
Progress in Variational Methods: Proceedings of the International Conference on Variational MethodsАвтор: Liu C., Автор: Long Y. (eds.)
Размер книги: 1.95 Mb
|
|
|