当前位置: 首页 > 资源下载 > 系统管理 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Foundations of Mac OS X Leopard Security

Foundations of Mac OS X Leopard Security

书名:Foundations of Mac OS X Leopard Security

上传:石头

时间:2009-09-06

文件大小:21.09 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:Charles Edge, William Barker, Zack Smith
出版日期:April 24, 2008
出版社:Apress
页数:488
ISBN:ISBN-10: 1590599896 ISBN-13: 978-1590599891
文件格式:PDF


Product Description
Foundations of Mac OS X Leopard Security is written in partas a companion to the SANS Institute course for Mac OS X. It containsdetailed Mac OS X security information, but also walkthroughs onsecuring systems. By using the SANS Institute course as a sister to thebook, the focus includes both the beginning home user and the seasonedsecurity professional not accustomed to the Mac, and allows this titleto establish the “best practices” for Mac OS X for a wide audience.Additionally, the authors of the book are seasoned Mac and securityprofessionals, having built many of the largest network infrastructuresfor Apple and spoken at both DefCon and Black Hat on OS X security.
What you’ll learnSecurity overviewWalkthroughs to secure systemsWalkthroughs and suggestions for third–party applications on systemsMac forensicsMac hackingApple wireless securityMac OS X securityWho is this book for?A wide audience of users, power users, and administrators who wish to make sure their Mac platform is secure.
About the Author
Charles Edge has been working with Apple productssince he was a child. Professionally, Charles started with the Mac OSand Apple server offerings in1999 after years working with variousflavors of Unix. Charles began his consulting career working withSupport Technologies and Andersen Consulting. In 2000, he found a newhome at 318, a consulting firm in Santa Monica, California which is nowthe largest Mac consultancy in the country. At 318, Charles leads ateam of over 40 engineers and has worked with network architecture,security and storage for various vertical and horizontal markets.Charles has spoken at a variety of conferences including DefCon,BlackHat, LinuxWorld, MacWorld and the WorldWide Developers Conference.Charles’ first book, Mac Tiger Server Little Black Book, canbe purchased through Paraglyph Press. Charles recently hung up hissurfboard and moved to Minneapolis, Minnesota, with his wife, Lisa.Charles can be contacted at [email protected]
William Barker is a technical consultant at 318 anda freelance writer. He has a penchant for all things Web 2.0 relatedand is eagerly anticipating the day that he can wash his dishes andtake out the trash online. His website, techiestravel.com, is a hobbiehaven for two of his passions, technology and travel. He also wears amusician hat from time to time, making music: as a DJ, playing guitar,playing piano and mixing CD’s for friends. He lives in Venice,California with his trusty automobile, Lucille.
Zack Smith has been working as an IT consultant hisentire adult life. He has consulted for insurance companies,entertainment companies, medical organizations, and governmentalagencies. Zack holds an Apple Certified Trainer position where hastaught at Apple and various market centers in Boston, Virginia, LosAngeles, and Cupertino. As a certified instructor, Zack has taughtApple’s Security Best Practices Class, as well as many of the otherApple Certified System Administrator level classes (such as Mac OS XDeployment and Mac OS X Directory Services). Zack has been a speaker atMacWorld San Francisco as well as many other smaller venues such as ITuser groups. Zack is also the author of a set of open-source ITadministration software and scripts and has long term plans of being afull time Objective C developer. When not attending IT & Securityconferences or traveling for work at 318, Zack can be found in PortlandOregon with his partner in crime Anna, and dog, Watson.
Tags:FoundationsLeopardMacSecurity


相关书籍

  • Security and Usability: Designing Secure Systems that People Can Use
  • Wireless Security: Know It All (PDF英文版)
  • The Tao of Network Security Monitoring Beyond Intrusion Detection
  • Learn C on the Mac
  • Learn C on the Mac

评论 (3) 1 All

登陆 | 还没注册?