• Complain

John Ray - Maximum Mac OS X Security

Here you can read online John Ray - Maximum Mac OS X Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2003, publisher: Sams, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

John Ray Maximum Mac OS X Security

Maximum Mac OS X Security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Maximum Mac OS X Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.

Yet most Mac OS X books are generally quite simplistic -- with the exception of the authors Mac OS X Unleashed, the first book to address OS Xs underlying BSD subsystem.

Maximum Mac OS X Security takes a similar UNIX-oriented approach, going into significantly greater depth on OS X security topics:

  • Setup basics, including Airport and network topology security.
  • User administration and resource management with NetInfo.
  • Types of attacks, how attacks work, and how to stop them.
  • Network service security, such as e-mail, Web, and file sharing.
  • Intrusion prevention and detection, and hands-on detection tools.

John Ray: author's other books


Who wrote Maximum Mac OS X Security? Find out the surname, the name of the author of the book and a list of all author's works by series.

Maximum Mac OS X Security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Maximum Mac OS X Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
[]
access
guest access
Internet access
lukemftpd FTP (File Transfer Protocol) server access
wu-ftpd FTP servers
access controls
accessing
accounts
user accounts
user accounts
activating
mod ssl module
adding
addresses
administrative functions
administrators
lukemftpd FTP (File Transfer Protocol) servers
system vulnerabilities
user accounts
guest access
public file sharing
alarm systems
alerts
Snort alerts
aliases
aliases files
anonymous FTP servers
mail server protection
Apache
configuration directives
configuration files
configurations
directories
exploits
mod hfs apple support
mod ssl module
networks
rendezvous advertising
SSL-enabled Apache Web servers
user accounts, authenticating against
AppleShare
ARP (Address Resolution Protocol)
ARP mappings
static ARP mappings
ARP poisoning
ARP spoofing
Arpwatch
asymmetric cryptosystems
attachments (email)
attacks
ARP spoofing
brute-force attacks
DDoS (Distributed Denial of Service) attacks
SYN floods
authenticating
user accounts
authentication
public key authentication in SSH
authoritative files
verifying
automating

Picture 1
Picture 2Picture 3

By John Ray, Dr. William Ray
Slots : 1


[]
backups
restore from backup requests
bin users
biometric systems
blocking
SLP service advertisements
brute force attacks
BSD commands
BSD tar
bugs
input validation bugs
building
skeleton user accounts
burning
CDs
DVDs

Picture 4
Picture 5Picture 6

By John Ray, Dr. William Ray
Slots : 1


[]
CA (Certificat Authority)
CDs
burning
certificate signing requests
CGI
enciphering
clients
code
testing
coding
command-line administration
user accounts
command-line options
commands
SMTP commands
tr commands
compile-time options
compiling
Apache Web servers
configuration files
Apache Web server configuration files
configuring
Apache Web servers
firewalls
Samba
user account file sharing
consolidated password storage
control files
controlling
controls
ftpaccess file controls
copying
digital media
Corundum (Precious Gem software)
couic
cracking
creating
creating/deleting
user accounts
asymmetric cryptosystems
enciphering
encoding
symmetric cryptosystems
cryptosystems
asymmetric cryptosystems
symmetric cryptosystems
cryyptography
customizing
[See terrorists]

Picture 7
Picture 8Picture 9

By John Ray, Dr. William Ray
Slots : 1


[]
daemons
natd daemon
Sendmail daemons
xinetd network service daemon
data
maintaining integrity
managing
transmitting
data recovery
file synchronization
database servers
decrypting
text
defining
deleting
delivering
email
deploying
digest authentication
digital media
copying
directives
directories
Apache directories
Apache Web server directories
NetInfo directories
disabling
file sharing
guest access
public file sharing
backups
disc copy utility
disc images
disc images
displaying
current user logins
user login/logout histories
domains
NIS domains
downloading
downtime notifications
dumping
DVDs
burning

Picture 10
Picture 11Picture 12

By John Ray, Dr. William Ray
Slots : 1


[]
sniffers
editing
user capabilities
educating
email
delivering
POP-based email
steganography
email attachments
email clients
enabling
enciphering
encoding
encrypting
text
tunnel encryption
encryption protocols
sniffed connections
exchanging
encrypted data
exploits
Apache Web server exploits
external processes

Picture 13
Picture 14Picture 15

By John Ray, Dr. William Ray
Slots : 1


[]
facilities
public facilities
FBI
fields
file sharing
public file sharing
files
.htaccess files
.htpasswd files
aliases files
Apache Web server configuration files
authoritative files
control files
ftpaccess files
transferring
configuring
internet sharing
fixing
folders
disc images
formatting
FTP
servers
anonymous FTP servers
FTP servers
lukemftpd FTP servers
wu-ftpd FTP servers
[See also sftp (secure FTP)]
ftpaccess files
wu-ftpd FTP servers
ftphosts files
wu-ftpd FTP servers
ftpusers files
wu-ftpd FTP servers
functions
administrative functions

Picture 16
Picture 17Picture 18

By John Ray, Dr. William Ray
Slots : 1


[]
GPG (Gnu Pivacy Guard)
encrypted data
key pairs
text
guest access
disabling
guest user accounts
guests
network access
GUI access
GUI controls

Picture 19
Picture 20Picture 21

By John Ray, Dr. William Ray
Slots : 1


[]
hardware
alarm systems
biometric systems
installation
lock systems
rack mounting
servers
tracking systems
hdiutil utility
disc images
hiding
hosts
ignored hosts
HTML
HTML email
http

Picture 22
Picture 23Picture 24

By John Ray, Dr. William Ray
Slots : 1


[]
ICMP
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Maximum Mac OS X Security»

Look at similar books to Maximum Mac OS X Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Maximum Mac OS X Security»

Discussion, reviews of the book Maximum Mac OS X Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.