Here you can read online John Ray - Maximum Mac OS X Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2003, publisher: Sams, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
Maximum Mac OS X Security: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "Maximum Mac OS X Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.
Yet most Mac OS X books are generally quite simplistic -- with the exception of the authors Mac OS X Unleashed, the first book to address OS Xs underlying BSD subsystem.
Maximum Mac OS X Security takes a similar UNIX-oriented approach, going into significantly greater depth on OS X security topics:
Setup basics, including Airport and network topology security.
User administration and resource management with NetInfo.
Types of attacks, how attacks work, and how to stop them.
Network service security, such as e-mail, Web, and file sharing.
Intrusion prevention and detection, and hands-on detection tools.
John Ray: author's other books
Who wrote Maximum Mac OS X Security? Find out the surname, the name of the author of the book and a list of all author's works by series.
Maximum Mac OS X Security — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Maximum Mac OS X Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
[] access guest access Internet access lukemftpd FTP (File Transfer Protocol) server access wu-ftpd FTP servers access controls accessing accounts user accounts user accounts activating mod ssl module adding addresses administrative functions administrators lukemftpd FTP (File Transfer Protocol) servers system vulnerabilities user accounts guest access public file sharing alarm systems alerts Snort alerts aliases aliases files anonymous FTP servers mail server protection Apache configuration directives configuration files configurations directories exploits mod hfs apple support mod ssl module networks rendezvous advertising SSL-enabled Apache Web servers user accounts, authenticating against AppleShare ARP (Address Resolution Protocol) ARP mappings static ARP mappings ARP poisoning ARP spoofing Arpwatch asymmetric cryptosystems attachments (email) attacks ARP spoofing brute-force attacks DDoS (Distributed Denial of Service) attacks SYN floods authenticating user accounts authentication public key authentication in SSH authoritative files verifying automating
By John Ray, Dr. William Ray Slots : 1
[] backups restore from backup requests bin users biometric systems blocking SLP service advertisements brute force attacks BSD commands BSD tar bugs input validation bugs building skeleton user accounts burning CDs DVDs
By John Ray, Dr. William Ray Slots : 1
[] CA (Certificat Authority) CDs burning certificate signing requests CGI enciphering clients code testing coding command-line administration user accounts command-line options commands SMTP commands tr commands compile-time options compiling Apache Web servers configuration files Apache Web server configuration files configuring Apache Web servers firewalls Samba user account file sharing consolidated password storage control files controlling controls ftpaccess file controls copying digital media Corundum (Precious Gem software) couic cracking creating creating/deleting user accounts asymmetric cryptosystems enciphering encoding symmetric cryptosystems cryptosystems asymmetric cryptosystems symmetric cryptosystems cryyptography customizing [See terrorists]
By John Ray, Dr. William Ray Slots : 1
[] daemons natd daemon Sendmail daemons xinetd network service daemon data maintaining integrity managing transmitting data recovery file synchronization database servers decrypting text defining deleting delivering email deploying digest authentication digital media copying directives directories Apache directories Apache Web server directories NetInfo directories disabling file sharing guest access public file sharing backups disc copy utility disc images disc images displaying current user logins user login/logout histories domains NIS domains downloading downtime notifications dumping DVDs burning
By John Ray, Dr. William Ray Slots : 1
[] sniffers editing user capabilities educating email delivering POP-based email steganography email attachments email clients enabling enciphering encoding encrypting text tunnel encryption encryption protocols sniffed connections exchanging encrypted data exploits Apache Web server exploits external processes
[] GPG (Gnu Pivacy Guard) encrypted data key pairs text guest access disabling guest user accounts guests network access GUI access GUI controls
By John Ray, Dr. William Ray Slots : 1
[] hardware alarm systems biometric systems installation lock systems rack mounting servers tracking systems hdiutil utility disc images hiding hosts ignored hosts HTML HTML email http
Look at similar books to Maximum Mac OS X Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book Maximum Mac OS X Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.