Book Details:
Publisher: | Apress |
Series: |
Apress
|
Author: | Charles S. Edge |
Edition: | 2 |
ISBN-10: | 1430227303 |
ISBN-13: | 9781430227304 |
Pages: | 648 |
Published: | Jun 07 2010 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 13.49 MB |
Book Description:
A common misconception in the Mac community is that Macs operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new Snow Leopard operating system. Using the SANS Institute course as a sister, this book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience. The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security. What youll learn The newest security techniques on Mac OS X and Snow Leopard operating system from the best and brightest The details of the entire Mac OS X Snow Leopard operating system for the desktop and server, and how to secure these systems Considerations for third-party applications on systems The details of Mac forensics and Mac hacking How to tackle Apple wireless security Who this book is for This book is for new users, power users, and administrators who wish to make sure that their Mac platform is secure. Table of Contents Security Quick-Start Services, Daemons, and Processes Securing User Accounts File System Permissions Reviewing Logs and Monitoring Application Signing and Sandbox Securing Web Browsers and E-mail Malware Security: Combating Viruses, Worms, and Root Kits Encrypting Files and Volumes Securing Network Traffic Setting Up the Mac OS X Firewall Securing a Wireless Network Part IV: File Services Web Site Security Remote Connectivity Server Security Network Scanning, Intrusion Detection, and Intrusion Prevention Tools Backup and Fault Tolerance Forensics
Building Secure J2EE Applications
Enterprise Java Security: Building Secure J2EE Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java 2 Platform, Enterprise Edition (J2EE), and Java 2 Platform, Standard Edition (J2SE), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Java Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP),...
A Data-Centric Approach to Securing the Enterprise
A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise Overview Learn sample forms and process flows for quick and easy use. An easy-to-follow reference for implementing information security in the enterprise. Learn enterprise information security challenges and roadmap to success. In Detail Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments. "Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining ...
From Solo Install to Enterprise Integration
This book is intended for those who need to get things done with Mac OS X Server 10.6. As such, you can use this book two ways. Those new to Mac OS X Server can read straight through the entire book, and by the end should feel competent to administer any Mac server thrown their way. For those with some knowledge of Mac OS X Server, or perhaps a thorough knowledge of other Unix-based servers, the book is arranged by tasks so that you can either start reading at any point, skipping material you already know, or pick and choose the chapters youll find most helpful to your own work or system needs. This task-oriented approach also makes the book useful as a general reference for all aspects of Mac OS X Server. Throughout the book, special emphasis is giv...
2007 - 2021 © eBooks-IT.org