Mac OS X security
Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnera...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
New Riders
2003
|
Ausgabe: | 1st ed. |
Schriftenreihe: | Voices that matter
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047348712 | ||
003 | DE-627-1 | ||
005 | 20240228113908.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2003 xx |||||o 00| ||eng c | ||
020 | |a 0735713480 |c paperback |9 0-7357-1348-0 | ||
020 | |a 9780735713482 |c paperback |9 978-0-7357-1348-2 | ||
035 | |a (DE-627-1)047348712 | ||
035 | |a (DE-599)KEP047348712 | ||
035 | |a (ORHE)0735713480 | ||
035 | |a (DE-627-1)047348712 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Potter, Bruce |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Mac OS X security |c Bruce Potter, Preston Norvell, Brian Wotring |
250 | |a 1st ed. | ||
264 | 1 | |a Indianapolis, Ind. |b New Riders |c 2003 | |
300 | |a 1 online resource (xx, 385 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Voices that matter | |
500 | |a Includes bibliographical references (pages 361-369) and index | ||
520 | |a Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents. | ||
546 | |a English. | ||
630 | 2 | 0 | |a Mac OS |
650 | 0 | |a Operating systems (Computers) | |
650 | 0 | |a Macintosh (Computer) |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Mac OS | |
650 | 4 | |a Electrical & Computer Engineering | |
650 | 4 | |a Engineering & Applied Sciences | |
650 | 4 | |a Telecommunications | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 4 | |a Macintosh (Ordinateur) ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a operating systems | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Macintosh (Computer) ; Security measures | |
650 | 4 | |a Operating systems (Computers) | |
700 | 1 | |a Norvell, Preston |e MitwirkendeR |4 ctb | |
700 | 1 | |a Wotring, Brian |e MitwirkendeR |4 ctb | |
776 | 1 | |z 0735713480 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0735713480 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0735713480/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047348712 |
---|---|
_version_ | 1818767358731223040 |
adam_text | |
any_adam_object | |
author | Potter, Bruce |
author2 | Norvell, Preston Wotring, Brian |
author2_role | ctb ctb |
author2_variant | p n pn b w bw |
author_facet | Potter, Bruce Norvell, Preston Wotring, Brian |
author_role | aut |
author_sort | Potter, Bruce |
author_variant | b p bp |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047348712 (DE-599)KEP047348712 (ORHE)0735713480 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03451cam a22006612 4500</leader><controlfield tag="001">ZDB-30-ORH-047348712</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228113908.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2003 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0735713480</subfield><subfield code="c">paperback</subfield><subfield code="9">0-7357-1348-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780735713482</subfield><subfield code="c">paperback</subfield><subfield code="9">978-0-7357-1348-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047348712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047348712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0735713480</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047348712</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Potter, Bruce</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mac OS X security</subfield><subfield code="c">Bruce Potter, Preston Norvell, Brian Wotring</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">New Riders</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 385 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Voices that matter</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 361-369) and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Macintosh (Computer)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical & Computer Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering & Applied Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Macintosh (Ordinateur) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Macintosh (Computer) ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Norvell, Preston</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wotring, Brian</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0735713480</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0735713480</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0735713480/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047348712 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:48:37Z |
institution | BVB |
isbn | 0735713480 9780735713482 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xx, 385 pages) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | New Riders |
record_format | marc |
series2 | Voices that matter |
spelling | Potter, Bruce VerfasserIn aut Mac OS X security Bruce Potter, Preston Norvell, Brian Wotring 1st ed. Indianapolis, Ind. New Riders 2003 1 online resource (xx, 385 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Voices that matter Includes bibliographical references (pages 361-369) and index Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents. English. Mac OS Operating systems (Computers) Macintosh (Computer) Security measures Computer security Computer networks Security measures Computer Security Electrical & Computer Engineering Engineering & Applied Sciences Telecommunications Systèmes d'exploitation (Ordinateurs) Macintosh (Ordinateur) ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures Macintosh (Computer) ; Security measures Norvell, Preston MitwirkendeR ctb Wotring, Brian MitwirkendeR ctb 0735713480 Erscheint auch als Druck-Ausgabe 0735713480 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/0735713480/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Potter, Bruce Mac OS X security Mac OS Operating systems (Computers) Macintosh (Computer) Security measures Computer security Computer networks Security measures Computer Security Electrical & Computer Engineering Engineering & Applied Sciences Telecommunications Systèmes d'exploitation (Ordinateurs) Macintosh (Ordinateur) ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures Macintosh (Computer) ; Security measures |
title | Mac OS X security |
title_auth | Mac OS X security |
title_exact_search | Mac OS X security |
title_full | Mac OS X security Bruce Potter, Preston Norvell, Brian Wotring |
title_fullStr | Mac OS X security Bruce Potter, Preston Norvell, Brian Wotring |
title_full_unstemmed | Mac OS X security Bruce Potter, Preston Norvell, Brian Wotring |
title_short | Mac OS X security |
title_sort | mac os x security |
topic | Mac OS Operating systems (Computers) Macintosh (Computer) Security measures Computer security Computer networks Security measures Computer Security Electrical & Computer Engineering Engineering & Applied Sciences Telecommunications Systèmes d'exploitation (Ordinateurs) Macintosh (Ordinateur) ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures Macintosh (Computer) ; Security measures |
topic_facet | Mac OS Operating systems (Computers) Macintosh (Computer) Security measures Computer security Computer networks Security measures Computer Security Electrical & Computer Engineering Engineering & Applied Sciences Telecommunications Systèmes d'exploitation (Ordinateurs) Macintosh (Ordinateur) ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures Macintosh (Computer) ; Security measures |
url | https://learning.oreilly.com/library/view/-/0735713480/?ar |
work_keys_str_mv | AT potterbruce macosxsecurity AT norvellpreston macosxsecurity AT wotringbrian macosxsecurity |