|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn233000259 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
080530s2008 caua o 001 0 eng d |
010 |
|
|
|a 2008297716
|
040 |
|
|
|a CtWfDGI
|b eng
|e pn
|c COCUF
|d OCLCQ
|d UMI
|d CEF
|d NHM
|d B24X7
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d LIV
|d OCLCQ
|d OCLCO
|d OCLCA
|d COO
|d WYU
|d AU@
|d VT2
|d CNCEN
|d LDP
|d UKBTH
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 428738570
|a 1044439486
|a 1056405870
|a 1058121795
|a 1060863024
|a 1064040599
|a 1075573235
|a 1103269007
|a 1129343638
|a 1153032609
|a 1159629636
|a 1192344707
|a 1240513841
|
020 |
|
|
|z 9781590599891
|
020 |
|
|
|z 1590599896
|
020 |
|
|
|z 9781430206460
|
020 |
|
|
|z 1430206462
|
024 |
8 |
|
|a 9781590599891
|
029 |
1 |
|
|a AU@
|b 000053250178
|
029 |
1 |
|
|a CHBIS
|b 006150395
|
029 |
1 |
|
|a CHVBK
|b 17123880X
|
029 |
1 |
|
|a DEBSZ
|b 355442574
|
029 |
1 |
|
|a HEBIS
|b 291512895
|
029 |
1 |
|
|a AU@
|b 000067104516
|
035 |
|
|
|a (OCoLC)233000259
|z (OCoLC)428738570
|z (OCoLC)1044439486
|z (OCoLC)1056405870
|z (OCoLC)1058121795
|z (OCoLC)1060863024
|z (OCoLC)1064040599
|z (OCoLC)1075573235
|z (OCoLC)1103269007
|z (OCoLC)1129343638
|z (OCoLC)1153032609
|z (OCoLC)1159629636
|z (OCoLC)1192344707
|z (OCoLC)1240513841
|
037 |
|
|
|a CL0500000044
|b Safari Books Online
|
050 |
|
4 |
|a QA76.76.O63
|b E34 2008eb
|
082 |
0 |
4 |
|a 005.4/4682
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Edge, Charles S.,
|c Jr.
|
245 |
1 |
0 |
|a Foundations of Mac OS X Leopard security /
|c Charles S. Edge, Jr., William Barker, and Zack Smith ; technical reviewers, Mike Lee, Frank Pohlmann.
|
246 |
3 |
0 |
|a Mac OS X Leopard security
|
260 |
|
|
|a Berkeley, Calif. :
|b Apress,
|c ©2008.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
505 |
0 |
|
|a Ch. 1. Security quick-start -- Ch. 2. Security fundamentals -- Ch. 3. Securing user accounts -- Ch. 4. Malware security : combating viruses, worms, and root kits -- Ch. 5. Securing Web browsers and e-mail -- Ch. 6. Reviewing logs and monitoring -- Ch. 7. Securing network traffic -- Ch. 8. Setting up the Mac OS X firewall -- Ch. 9. Securing a wireless network -- Ch. 10. File services -- Ch. 11. Web site security -- Ch. 12. Remote connectivity -- Ch. 13. Server security -- Ch. 14. Network scanning, intrusion detection, and intrusion prevention tools -- Ch. 15. Backup and fault tolerance -- Ch. 16. Forensics -- App. A. Xsan security -- App. B. Acceptable use policy -- App. C. Secure development -- App. D. Introduction to cryptography.
|
520 |
|
|
|a Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish the "best practices" for Mac OS X for a wide audience. Additionally, the authors of the book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DefCon and Black Hat on OS X security. What you'll learn Security overview Walkthroughs to secure systems Walkthroughs and suggestions for third–party applications on systems Mac forensics Mac hacking Apple wireless security Mac OS X security Who this book is for A wide audience of users, power users, and administrators who wish to make sure their Mac platform is secure.
|
542 |
|
|
|f Copyright © Apress
|g 2008
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Mac OS.
|
630 |
0 |
7 |
|a Mac OS.
|2 blmlsh
|
630 |
0 |
7 |
|a Mac OS
|2 fast
|
650 |
|
0 |
|a Operating systems (Computers)
|
650 |
|
0 |
|a Macintosh (Computer)
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Systèmes d'exploitation (Ordinateurs)
|
650 |
|
6 |
|a Macintosh (Ordinateur)
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a operating systems.
|2 aat
|
650 |
|
7 |
|a Operating systems (Computers)
|2 blmlsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Macintosh (Computer)
|x Security measures
|2 fast
|
650 |
|
7 |
|a Operating systems (Computers)
|2 fast
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
700 |
1 |
|
|a Barker, William.
|4 aut
|
700 |
1 |
|
|a Smith, Zack.
|4 aut
|
700 |
1 |
|
|a Lee, Mike.
|4 rev
|
700 |
1 |
|
|a Pohlmann, Frank.
|4 rev
|
830 |
|
0 |
|a Safari Books Online.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781590599891/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00025472
|
938 |
|
|
|a Internet Archive
|b INAR
|n foundationsofmac0000edge
|
994 |
|
|
|a 92
|b IZTAP
|