|
|
|
|
LEADER |
03206nam a22004335i 4500 |
001 |
978-1-4302-2731-1 |
003 |
DE-He213 |
005 |
20150716151428.0 |
007 |
cr nn 008mamaa |
008 |
101231s2010 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781430227311
|9 978-1-4302-2731-1
|
024 |
7 |
|
|a 10.1007/978-1-4302-2731-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA75.5-76.95
|
072 |
|
7 |
|a UY
|2 bicssc
|
072 |
|
7 |
|a COM014000
|2 bisacsh
|
082 |
0 |
4 |
|a 004
|2 23
|
100 |
1 |
|
|a Edge, Charles.
|e author.
|
245 |
1 |
0 |
|a Enterprise Mac Security
|h [electronic resource] :
|b Mac OS X Snow Leopard /
|c by Charles Edge, William Barker, Beau Hunter, Gene Sullivan.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress,
|c 2010.
|
300 |
|
|
|a 648 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a The Big Picture -- Security Quick-Start -- Services, Daemons, and Processes -- Securing User Accounts -- File System Permissions -- Reviewing Logs and Monitoring -- Securing the Ecosystem -- Application Signing and Sandbox -- Securing Web Browsers and E-mail -- Malware Security: Combating Viruses, Worms, and Root Kits -- Encrypting Files and Volumes -- Network Traffic -- Securing Network Traffic -- Setting Up the Mac OS X Firewall -- Securing a Wireless Network -- Sharing -- File Services -- Web Site Security -- Remote Connectivity -- Server Security -- Securing the Workplace -- Network Scanning, Intrusion Detection, and Intrusion Prevention Tools -- Backup and Fault Tolerance -- Forensics.
|
520 |
|
|
|a A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new Snow Leopard operating system. Using the SANS Institute course as a sister, this book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience. The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security.
|
650 |
|
0 |
|a Computer science.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Science, general.
|
700 |
1 |
|
|a Barker, William.
|e author.
|
700 |
1 |
|
|a Hunter, Beau.
|e author.
|
700 |
1 |
|
|a Sullivan, Gene.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781430227304
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-1-4302-2731-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-CWD
|
950 |
|
|
|a Professional and Applied Computing (Springer-12059)
|