Enterprise Mac Security: Mac OS X Snow Leopard download ebook
Par carothers brenda le mercredi, mai 9 2012, 00:16 - Lien permanent
A common misconception in the Mac community is that Macs operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.
Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new Snow Leopard operating system.
Using the SANS Institute course as a sister, this book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience.
The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security.
What youll learn The newest security techniques on Mac OS X and latest Snow Leopard operating system from the best and brightest The details of the entire new Mac OS X Snow Leopard Operating System for the desktop and server, and how to secure these systems Considerations for third-party applications on systems The details of Mac forensics and Mac hacking How to tackle Apple wireless security Who this book is for
This book is for new users, power users, and administrators who wish to make sure that their Mac platform is secure.
Table of Contents Security Quick-Start Services, Daemons, and Processes Securing User Accounts File System Permissions Reviewing Logs and Monitoring Application Signing and Sandbox Securing Web Browsers and E-mail Malware Security: Combating Viruses, Worms, and Root Kits Encrypting Files and Volumes Securing Network Traffic Setting Up the Mac OS X Firewall Securing a Wireless Network Part IV: File Services Web Site Security Remote Connectivity Server Security Network Scanning, Intrusion Detection, and Intrusion Prevention Tools Backup and Fault Tolerance Forensics
About the Author
Charles Edge has been working with Apple products since he was a child. Professionally, Charles started with the Mac OS and Apple server offerings in1999 after years working with various flavors of Unix. Charles began his consulting career working with Support Technologies and Andersen Consulting. In 2000, he found a new home at 318, a consulting firm in Santa Monica, California which is now the largest Mac consultancy in the country. At 318, Charles leads a team of over 40 engineers and has worked with network architecture, security and storage for various vertical and horizontal markets. Charles has spoken at a variety of conferences including DefCon, BlackHat, LinuxWorld, MacWorld and the WorldWide Developers Conference. Charles' first book, Mac Tiger Server Little Black Book, can be purchased through Paraglyph Press. Charles recently hung up his surfboard and moved to Minneapolis, Minnesota, with his wife, Lisa. Charles can be contacted at krypted@mac.com^William Barker is a technical consultant at 318 and a freelance writer. He has a penchant for all things Web 2.0 related and is eagerly anticipating the day that he can wash his dishes and take out the trash online. His website, techiestravel.com, is a hobbie haven for two of his passions, technology and travel. He also wears a musician hat from time to time, making music: as a DJ, playing guitar, playing piano and mixing CD's for friends. He lives in Venice, California with his trusty automobile, Lucille.^Beau Hunter is a systems engineer employed at 318, Inc. in Santa Monica, California. He has been working professionally with Apple technologies since 1999, and has been supporting businesses running the Mac OS for over 8 years. Throughout this time, he has developed a name supporting and securing Apple OS X systems in multiple capacities: cross-platform systems integration, clustered web and database solutions, high-performance SANs, high-capacity backup systems, automation, and multi-OS mass deployment. Beau has also spoken at numerous events including MacWorld 2009.
MORE books: Becoming a Contagious Christian pdf downloadBecoming a Contagious Christian pdf download
Becoming a Contagious Christian pdf download
Tags: Download book Enterprise Mac Security: Mac OS X Snow Leopard Download ebook Enterprise Mac Security: Mac OS X Snow Leopard Download book Enterprise Mac Security: Mac OS X Snow Leopard pdf Download ebook Enterprise Mac Security: Mac OS X Snow Leopard pdf Ebook Enterprise Mac Security: Mac OS X Snow Leopard djvu by Beau Hunter, Charles Edge, Gene Sullivan, William Barker Book Enterprise Mac Security: Mac OS X Snow Leopard djvu by Beau Hunter, Charles Edge, Gene Sullivan, William Barker