Maximum Mac OS X Security (Paperback)
John Ray, William C. Ray
- 出版商: SAMS
- 出版日期: 2003-05-13
- 售價: $1,870
- 貴賓價: 9.5 折 $1,777
- 語言: 英文
- 頁數: 768
- 裝訂: Paperback
- ISBN: 0672323818
- ISBN-13: 9780672323812
-
相關分類:
MAC OS 蘋果電腦、資訊安全
已過版
買這商品的人也買了...
-
$680$537 -
$680$537 -
$680$578 -
$2,010$1,910 -
$1,400$1,330 -
$2,010$1,910 -
$799$639 -
$700Microsoft Visual Basic .NET Step by Step
-
$580$458 -
$700Special Edition Using ASP.NET
-
$700$686 -
$920$727 -
$490$382 -
$825Programming with Managed Extensions for Microsoft Visual C++ .NET--Version 2003
-
$650$553 -
$760$600 -
$590$466 -
$620$527 -
$680$537 -
$690$538 -
$600$474 -
$780$616 -
$1,580$1,501 -
$1,170$1,112 -
$768$730
相關主題
商品描述
Descriptions:
While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.
Yet most Mac OS X books are generally quite simplistic -- with the exception of the author's Mac OS X Unleashed, the first book to address OS X's underlying BSD subsystem.
Maximum Mac OS X Security takes a similar UNIX-oriented approach, going into significantly greater depth on OS X security topics:
- Setup basics, including Airport and network topology security.
- User administration and resource management with NetInfo.
- Types of attacks, how attacks work, and how to stop them.
- Network service security, such as e-mail, Web, and file sharing.
- Intrusion prevention and detection, and hands-on detection tools.
Table of Contents:
Introduction.
I. MAC OS X SECURITY BASICS: LEARNING TO THINK SECURE.
1. An Introduction to Mac OS X Security.
2. Thinking Secure: Security Philosophy and Physical Concerns.
3. People Problems: Users, Intruders, and the World Around Them.
II. VULNERABILITIES AND EXPOSURES: HOW THINGS DON¿T WORK, AND WHY.
4. Theft and Destruction of Property: Data Attacks.
5. Picking Locks: Password Attacks.
6. Evil Automatons: Malware, Trojans, Viruses, and Worms.
7. Eavesdropping and Snooping for Information: Sniffers and Scanners.
8. Impersonation and Infiltration: Spoofing.
9. Everything Else.
III. SPECIFIC MAC OS X RESOURCES AND HOW TO SECURE THEM: SECURITY TIPS, TRICKS, AND RECIPES.
10. User, Environment, and Application Security.
11. Introduction to Mac OS X Network Services.
12. FTP Security.
13. Mail Server Security.
14. Remote Access: Secure Shell, VNC, Timbuktu, Apple Remote Desktop.
15. Web Server Security.
16. File Sharing Security.
IV. PREVENTION, DETECTION, AND REACTION TO ATTACKS: HEALTH CARE AND CHECKUPS FOR YOUR MACHINE.
17. Blocking Network Access: Firewalls.
18. Alarm Systems: Intrusion Detection.
19. Logs and User Activity Accounting.
20. Disaster Planning and Recovery.
V. APPENDIXES.
Appendix A. Glossary.
Appendix B. Security Resources.
Appendix C. Secure Web Development.
Index.