Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Edge, Charles S., Jr.

Title Foundations of Mac OS X Leopard security / Charles S. Edge, Jr., William Barker, and Zack Smith ; technical reviewers, Mike Lee, Frank Pohlmann. [O'Reilly electronic resource]

Imprint Berkeley, Calif. : Apress, ©2008.
QR Code
Description 1 online resource
text file
Series Safari Books Online.
Contents Ch. 1. Security quick-start -- Ch. 2. Security fundamentals -- Ch. 3. Securing user accounts -- Ch. 4. Malware security : combating viruses, worms, and root kits -- Ch. 5. Securing Web browsers and e-mail -- Ch. 6. Reviewing logs and monitoring -- Ch. 7. Securing network traffic -- Ch. 8. Setting up the Mac OS X firewall -- Ch. 9. Securing a wireless network -- Ch. 10. File services -- Ch. 11. Web site security -- Ch. 12. Remote connectivity -- Ch. 13. Server security -- Ch. 14. Network scanning, intrusion detection, and intrusion prevention tools -- Ch. 15. Backup and fault tolerance -- Ch. 16. Forensics -- App. A. Xsan security -- App. B. Acceptable use policy -- App. C. Secure development -- App. D. Introduction to cryptography.
Summary Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish the "best practices" for Mac OS X for a wide audience. Additionally, the authors of the book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DefCon and Black Hat on OS X security. What you'll learn Security overview Walkthroughs to secure systems Walkthroughs and suggestions for third-party applications on systems Mac forensics Mac hacking Apple wireless security Mac OS X security Who this book is for A wide audience of users, power users, and administrators who wish to make sure their Mac platform is secure.
Subject Mac OS.
Mac OS.
Mac OS
Operating systems (Computers)
Macintosh (Computer) -- Security measures.
Computer security.
Computer networks -- Security measures.
Systèmes d'exploitation (Ordinateurs)
Macintosh (Ordinateur) -- Sécurité -- Mesures.
Sécurité informatique.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
operating systems.
Operating systems (Computers)
Computer security.
Computer networks -- Security measures
Computer security
Macintosh (Computer) -- Security measures
Operating systems (Computers)
Engineering & Applied Sciences.
Computer Science.
Added Author Barker, William. Author.
Smith, Zack. Author.
Lee, Mike. Reviewer.
Pohlmann, Frank. Reviewer.
Added Title Mac OS X Leopard security
Standard No. 9781590599891
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information