Mac OS X Security

Mac OS X Security

4.11 - 1251 ratings - Source

Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.tail command, monitoring log files, 296 TASK, 318 acquisition stage, 319-321 analysis stage, 321 filesystem analysis, 322-324 timestamp analysis, 324-325 installing, 321 technical owners of services, incident response roles, 331 technicalanbsp;...

Title:Mac OS X Security
Author:Bruce Potter, Preston Norvell, Brian Wotring
Publisher:New Riders - 2003


You Must CONTINUE and create a free account to access unlimited downloads & streaming