Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Main Page
Table of content
Copyright
About the Authors
About the Technical Reviewers
Acknowledgments
Tell Us What You Think
Introduction
Organization and Content
Target Audience
Code Convention Used in This Book
Part I: The Basics
Chapter 1. Security Foundations
The Basics
Darwin
The Command Line
UNIX Security
Introducing NetInfo
NetInfo Security
Summary
Chapter 2. Installation
To BSD or Not to BSD
FilesystemsHFS+ Versus UFS
Mac OS X Install Step-by-Step
Summary
Part II: System Security
Chapter 3. Mac OS X Client General Security Practices
Concerns About Physical Access
Dual Booting and the Classic Environment
Staying Current with Mac OS X
User Accounts and Access Control
Filesystem Encryption
Summary
Chapter 4. What Is This UNIX Thing?
The Command Line Interface
Directories, Permissions, and File Ownership
Common UNIX Commands
UNIX Security
Summary
Chapter 5. User Applications
General Application Security Considerations
Keychain
'Mail.app' Security
Web Browser Security Issues
Summary
Part III: Network Security
Chapter 6. Internet Services
Web Services
Email Services
FTP
Remote Login (SSH)
Remote Apple Events
Xinetd
Summary
Chapter 7. File Sharing
WebDAV Services
Apple File Services
SMB File Services
Network File System
Personal File Sharing
Making Secure AFS Connections
Summary
Chapter 8. Network Services
Firewalling
VPN
AirPort Security
Antivirus Protection
Summary
Part IV: Enterprise Security
Chapter 9. Enterprise Host Configuration
Login Window
Kerberos
Rendezvous
Summary
Chapter 10. Directory Services
Yet Another 'The Basics'
NetInfo
Open Directory
More Fun with Directory Access
Summary
Part V: Auditing and Forensics
Chapter 11. Auditing
The Importance of Logging
General Considerations
Logging Options and Configuration
Monitoring Logs
Log Location Reference
Summary
Chapter 12. Forensics
An Overview of Computer Forensics
Osiris
Forensic Analysis with TASK
Summary
Chapter 13. Incident Response
What Does Incident Response Mean to You?
Incident Response Life Cycle
Summary
Part VI: Appendixes
Appendix A. SUID and SGID Files
SUID Files
SGID Files
Appendix B. Common Data Security Architecture
Benefits of the CDSA
CDSA Structural Overview
Appendix C. Further Reading
Chapter 1Security Foundations
Chapter 2Installation
Chapter 3Mac OS X Client General Security Practices
Chapter 4What Is This UNIX Thing?
Chapter 5User Applications
Chapter 6Internet Services
Chapter 7File Sharing
Chapter 8Network Services
Chapter 9Enterprise Host Configuration
Chapter 10Directory Services
Chapter 11Auditing
Chapter 12Forensics
Chapter 13Incident Response
Index
Index SYMBOL
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
Index V
Index W
Index X
← Prev
Back
Next →
← Prev
Back
Next →