جزییات کتاب
Книга Foundations of Mac OS X Leopard Security Foundations of Mac OS X Leopard SecurityКниги Mac OS Автор: Charles Edge, William Barker, Zack Smith Год издания: 2008 Формат: pdf Издат.:Apress Страниц: 488 Размер: 22 Язык: Русский0 (голосов: 0) Оценка:Foundations of Mac OS X Leopard Security by Charles Edge (Author), William Barker (Author), Zack Smith (Author)488 pages - Publisher: Apress (April 28, 2008)Product DescriptionFoundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish thebest practices” for Mac OS X for a wide audience. Additionally, the authors of the book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DefCon and Black Hat on OS X security.What you’ll learnSecurity overviewWalkthroughs to secure systemsWalkthroughs and suggestions for third–party applications on systemsMac forensicsMac hackingApple wireless securityMac OS X securityWho is this book for?A wide audience of users, power users, and administrators who wish to make sure their Mac platform is secure.Contents at a Glance:PART 1 ■ ■ ■ The Big Picture■CHAPTER 1 Security Quick-Star■CHAPTER 2 Security Fundamental■CHAPTER 3 Securing User AccountsPART 2 ■ ■ ■ Security Essentials■CHAPTER 4 Malware Security: Combating Viruses, Worms, and Root Kits■CHAPTER 5 Securing Web Browsers and E-mail■CHAPTER 6 Reviewing Logs and MonitoringPART 3 ■ ■ ■ Network Security■CHAPTER 7 Securing Network Traffic■CHAPTER 8 Setting Up the Mac OS X Firewall■CHAPTER 9 Securing a Wireless NetworkPART 4 ■ ■ ■ Sharing■CHAPTER 10 File Services■CHAPTER 11 Web Site Security■CHAPTER 12 Remote Connectivity■CHAPTER 13 Server SecurityPART 5 ■ ■ ■ Workplace Security■CHAPTER 14 Network Scanning, Intrusion Detection, and Intrusion Prevention Tools■CHAPTER 15 Backup and Fault Tolerance■CHAPTER 16 Forensics■APPENDIX A Xsan Security■APPENDIX B Acceptable Use Policy■APPENDIX C Secure Development■APPENDIX D Introduction to