Mac OS X security

Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnera...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Potter, Bruce (VerfasserIn)
Weitere Verfasser: Norvell, Preston (MitwirkendeR), Wotring, Brian (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Indianapolis, Ind. New Riders 2003
Ausgabe:1st ed.
Schriftenreihe:Voices that matter
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047348712
003 DE-627-1
005 20240228113908.0
007 cr uuu---uuuuu
008 191023s2003 xx |||||o 00| ||eng c
020 |a 0735713480  |c paperback  |9 0-7357-1348-0 
020 |a 9780735713482  |c paperback  |9 978-0-7357-1348-2 
035 |a (DE-627-1)047348712 
035 |a (DE-599)KEP047348712 
035 |a (ORHE)0735713480 
035 |a (DE-627-1)047348712 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 22 
100 1 |a Potter, Bruce  |e VerfasserIn  |4 aut 
245 1 0 |a Mac OS X security  |c Bruce Potter, Preston Norvell, Brian Wotring 
250 |a 1st ed. 
264 1 |a Indianapolis, Ind.  |b New Riders  |c 2003 
300 |a 1 online resource (xx, 385 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a Voices that matter 
500 |a Includes bibliographical references (pages 361-369) and index 
520 |a Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents. 
546 |a English. 
630 2 0 |a Mac OS 
650 0 |a Operating systems (Computers) 
650 0 |a Macintosh (Computer)  |x Security measures 
650 0 |a Computer security 
650 0 |a Computer networks  |x Security measures 
650 2 |a Computer Security 
650 4 |a Mac OS 
650 4 |a Electrical & Computer Engineering 
650 4 |a Engineering & Applied Sciences 
650 4 |a Telecommunications 
650 4 |a Systèmes d'exploitation (Ordinateurs) 
650 4 |a Macintosh (Ordinateur) ; Sécurité ; Mesures 
650 4 |a Sécurité informatique 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a operating systems 
650 4 |a Computer networks ; Security measures 
650 4 |a Computer security 
650 4 |a Macintosh (Computer) ; Security measures 
650 4 |a Operating systems (Computers) 
700 1 |a Norvell, Preston  |e MitwirkendeR  |4 ctb 
700 1 |a Wotring, Brian  |e MitwirkendeR  |4 ctb 
776 1 |z 0735713480 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 0735713480 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/0735713480/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047348712
_version_ 1818767358731223040
adam_text
any_adam_object
author Potter, Bruce
author2 Norvell, Preston
Wotring, Brian
author2_role ctb
ctb
author2_variant p n pn
b w bw
author_facet Potter, Bruce
Norvell, Preston
Wotring, Brian
author_role aut
author_sort Potter, Bruce
author_variant b p bp
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047348712
(DE-599)KEP047348712
(ORHE)0735713480
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 1st ed.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03451cam a22006612 4500</leader><controlfield tag="001">ZDB-30-ORH-047348712</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228113908.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2003 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0735713480</subfield><subfield code="c">paperback</subfield><subfield code="9">0-7357-1348-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780735713482</subfield><subfield code="c">paperback</subfield><subfield code="9">978-0-7357-1348-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047348712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047348712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0735713480</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047348712</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Potter, Bruce</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mac OS X security</subfield><subfield code="c">Bruce Potter, Preston Norvell, Brian Wotring</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">New Riders</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 385 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Voices that matter</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 361-369) and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Macintosh (Computer)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical &amp; Computer Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering &amp; Applied Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Macintosh (Ordinateur) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Macintosh (Computer) ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Norvell, Preston</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wotring, Brian</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0735713480</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0735713480</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0735713480/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047348712
illustrated Illustrated
indexdate 2024-12-18T08:48:37Z
institution BVB
isbn 0735713480
9780735713482
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (xx, 385 pages) illustrations
psigel ZDB-30-ORH
publishDate 2003
publishDateSearch 2003
publishDateSort 2003
publisher New Riders
record_format marc
series2 Voices that matter
spelling Potter, Bruce VerfasserIn aut
Mac OS X security Bruce Potter, Preston Norvell, Brian Wotring
1st ed.
Indianapolis, Ind. New Riders 2003
1 online resource (xx, 385 pages) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Voices that matter
Includes bibliographical references (pages 361-369) and index
Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.
English.
Mac OS
Operating systems (Computers)
Macintosh (Computer) Security measures
Computer security
Computer networks Security measures
Computer Security
Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
Systèmes d'exploitation (Ordinateurs)
Macintosh (Ordinateur) ; Sécurité ; Mesures
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
operating systems
Computer networks ; Security measures
Macintosh (Computer) ; Security measures
Norvell, Preston MitwirkendeR ctb
Wotring, Brian MitwirkendeR ctb
0735713480
Erscheint auch als Druck-Ausgabe 0735713480
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/0735713480/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Potter, Bruce
Mac OS X security
Mac OS
Operating systems (Computers)
Macintosh (Computer) Security measures
Computer security
Computer networks Security measures
Computer Security
Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
Systèmes d'exploitation (Ordinateurs)
Macintosh (Ordinateur) ; Sécurité ; Mesures
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
operating systems
Computer networks ; Security measures
Macintosh (Computer) ; Security measures
title Mac OS X security
title_auth Mac OS X security
title_exact_search Mac OS X security
title_full Mac OS X security Bruce Potter, Preston Norvell, Brian Wotring
title_fullStr Mac OS X security Bruce Potter, Preston Norvell, Brian Wotring
title_full_unstemmed Mac OS X security Bruce Potter, Preston Norvell, Brian Wotring
title_short Mac OS X security
title_sort mac os x security
topic Mac OS
Operating systems (Computers)
Macintosh (Computer) Security measures
Computer security
Computer networks Security measures
Computer Security
Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
Systèmes d'exploitation (Ordinateurs)
Macintosh (Ordinateur) ; Sécurité ; Mesures
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
operating systems
Computer networks ; Security measures
Macintosh (Computer) ; Security measures
topic_facet Mac OS
Operating systems (Computers)
Macintosh (Computer) Security measures
Computer security
Computer networks Security measures
Computer Security
Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
Systèmes d'exploitation (Ordinateurs)
Macintosh (Ordinateur) ; Sécurité ; Mesures
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
operating systems
Computer networks ; Security measures
Macintosh (Computer) ; Security measures
url https://learning.oreilly.com/library/view/-/0735713480/?ar
work_keys_str_mv AT potterbruce macosxsecurity
AT norvellpreston macosxsecurity
AT wotringbrian macosxsecurity