Book description
Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.
Table of contents
- Copyright
- About the Authors
- About the Technical Reviewers
- Acknowledgments
- Tell Us What You Think
- Introduction
- I. The Basics
-
II. System Security
- 3. Mac OS X Client General Security Practices
- 4. What Is This UNIX Thing?
- 5. User Applications
-
III. Network Security
- 6. Internet Services
- 7. File Sharing
- 8. Network Services
- IV. Enterprise Security
-
V. Auditing and Forensics
- 11. Auditing
- 12. Forensics
- 13. Incident Response
-
VI. Appendixes
- A. SUID and SGID Files
- B. Common Data Security Architecture
-
C. Further Reading
- Chapter 1—Security Foundations
- Chapter 2—Installation
- Chapter 3—Mac OS X Client General Security Practices
- Chapter 4—What Is This UNIX Thing?
- Chapter 5—User Applications
- Chapter 6—Internet Services
- Chapter 7—File Sharing
- Chapter 8—Network Services
- Chapter 9—Enterprise Host Configuration
- Chapter 10—Directory Services
- Chapter 11—Auditing
- Chapter 12—Forensics
- Chapter 13—Incident Response
Product information
- Title: Mac® OS X Security
- Author(s):
- Release date: May 2003
- Publisher(s): New Riders
- ISBN: 9780735713482
You might also like
book
Solaris 8 Security
Solaris 8 Security covers all the concepts and issues Solaris 8 administrators need to know in …
book
Running Mac OS X Tiger
Running Mac OS X Tiger is the ideal resource for power users and system administrators like …
book
The FreeBSD 6.2 Crash Course
FreeBSD is not particularly difficult to use, and its integrated documentation is adequate, but it can …
book
Apple Training Series: Mac OS X System Administration Reference, Volume 1
This comprehensive, technical reference guide provides in-depth information on Apple technical architecture. It will teach the …