Mac OS X security

Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnera...

Descripción completa

Detalles Bibliográficos
Autor principal: Potter, Bruce (-)
Otros Autores: Norvell, Preston, Wotring, Brian
Formato: Libro electrónico
Idioma:Inglés
Publicado: Indianapolis, Ind. : New Riders c2003.
Edición:1st ed
Colección:Voices that matter
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627153606719
Descripción
Sumario:Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.
Notas:Bibliographic Level Mode of Issuance: Monograph
Descripción Física:1 online resource (xx, 385 p. ) ill
Available also in a print edition
Bibliografía:Includes bibliographical references (p. 361-369) and index.