Foundations of Mac OS X Leopard security:
Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Berkeley, Calif.
Apress
2008
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781590599891/?ar |
Zusammenfassung: | Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish the "best practices" for Mac OS X for a wide audience. Additionally, the authors of the book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DefCon and Black Hat on OS X security. What you'll learn Security overview Walkthroughs to secure systems Walkthroughs and suggestions for third-party applications on systems Mac forensics Mac hacking Apple wireless security Mac OS X security Who this book is for A wide audience of users, power users, and administrators who wish to make sure their Mac platform is secure. |
Umfang: | 1 Online-Ressource |
ISBN: | 9781590599891 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047644230 | ||
003 | DE-627-1 | ||
005 | 20240228114238.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2008 xx |||||o 00| ||eng c | ||
020 | |a 9781590599891 |9 978-1-59059-989-1 | ||
035 | |a (DE-627-1)047644230 | ||
035 | |a (DE-599)KEP047644230 | ||
035 | |a (ORHE)9781590599891 | ||
035 | |a (DE-627-1)047644230 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.4/4682 |2 22 | |
100 | 1 | |a Edge, Charles S. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Foundations of Mac OS X Leopard security |c Charles S. Edge, Jr., William Barker, and Zack Smith ; technical reviewers, Mike Lee, Frank Pohlmann |
246 | 3 | 3 | |a Mac OS X Leopard security |
264 | 1 | |a Berkeley, Calif. |b Apress |c 2008 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish the "best practices" for Mac OS X for a wide audience. Additionally, the authors of the book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DefCon and Black Hat on OS X security. What you'll learn Security overview Walkthroughs to secure systems Walkthroughs and suggestions for third-party applications on systems Mac forensics Mac hacking Apple wireless security Mac OS X security Who this book is for A wide audience of users, power users, and administrators who wish to make sure their Mac platform is secure. | ||
630 | 2 | 0 | |a Mac OS |
650 | 0 | |a Operating systems (Computers) | |
650 | 0 | |a Macintosh (Computer) |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Mac OS | |
650 | 4 | |a Mac OS | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 4 | |a Macintosh (Ordinateur) ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a operating systems | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Macintosh (Computer) ; Security measures | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Engineering & Applied Sciences | |
650 | 4 | |a Computer Science | |
700 | 1 | |a Barker, William |e VerfasserIn |4 aut | |
700 | 1 | |a Smith, Zack |e VerfasserIn |4 aut | |
700 | 1 | |a Lee, Mike |e MitwirkendeR |4 ctb | |
700 | 1 | |a Pohlmann, Frank |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781590599891/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047644230 |
---|---|
_version_ | 1831287083977670657 |
adam_text | |
any_adam_object | |
author | Edge, Charles S. Barker, William Smith, Zack |
author2 | Lee, Mike Pohlmann, Frank |
author2_role | ctb ctb |
author2_variant | m l ml f p fp |
author_facet | Edge, Charles S. Barker, William Smith, Zack Lee, Mike Pohlmann, Frank |
author_role | aut aut aut |
author_sort | Edge, Charles S. |
author_variant | c s e cs cse w b wb z s zs |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047644230 (DE-599)KEP047644230 (ORHE)9781590599891 |
dewey-full | 005.4/4682 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.4/4682 |
dewey-search | 005.4/4682 |
dewey-sort | 15.4 44682 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03215cam a22006252c 4500</leader><controlfield tag="001">ZDB-30-ORH-047644230</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114238.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2008 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781590599891</subfield><subfield code="9">978-1-59059-989-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047644230</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047644230</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781590599891</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047644230</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.4/4682</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Edge, Charles S.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Foundations of Mac OS X Leopard security</subfield><subfield code="c">Charles S. Edge, Jr., William Barker, and Zack Smith ; technical reviewers, Mike Lee, Frank Pohlmann</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Mac OS X Leopard security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, Calif.</subfield><subfield code="b">Apress</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish the "best practices" for Mac OS X for a wide audience. Additionally, the authors of the book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DefCon and Black Hat on OS X security. What you'll learn Security overview Walkthroughs to secure systems Walkthroughs and suggestions for third-party applications on systems Mac forensics Mac hacking Apple wireless security Mac OS X security Who this book is for A wide audience of users, power users, and administrators who wish to make sure their Mac platform is secure.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Macintosh (Computer)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Macintosh (Ordinateur) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Macintosh (Computer) ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering & Applied Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barker, William</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Zack</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lee, Mike</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pohlmann, Frank</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781590599891/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047644230 |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:24:17Z |
institution | BVB |
isbn | 9781590599891 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Apress |
record_format | marc |
spelling | Edge, Charles S. VerfasserIn aut Foundations of Mac OS X Leopard security Charles S. Edge, Jr., William Barker, and Zack Smith ; technical reviewers, Mike Lee, Frank Pohlmann Mac OS X Leopard security Berkeley, Calif. Apress 2008 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish the "best practices" for Mac OS X for a wide audience. Additionally, the authors of the book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DefCon and Black Hat on OS X security. What you'll learn Security overview Walkthroughs to secure systems Walkthroughs and suggestions for third-party applications on systems Mac forensics Mac hacking Apple wireless security Mac OS X security Who this book is for A wide audience of users, power users, and administrators who wish to make sure their Mac platform is secure. Mac OS Operating systems (Computers) Macintosh (Computer) Security measures Computer security Computer networks Security measures Systèmes d'exploitation (Ordinateurs) Macintosh (Ordinateur) ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures Macintosh (Computer) ; Security measures Engineering & Applied Sciences Computer Science Barker, William VerfasserIn aut Smith, Zack VerfasserIn aut Lee, Mike MitwirkendeR ctb Pohlmann, Frank MitwirkendeR ctb |
spellingShingle | Edge, Charles S. Barker, William Smith, Zack Foundations of Mac OS X Leopard security Mac OS Operating systems (Computers) Macintosh (Computer) Security measures Computer security Computer networks Security measures Systèmes d'exploitation (Ordinateurs) Macintosh (Ordinateur) ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures Macintosh (Computer) ; Security measures Engineering & Applied Sciences Computer Science |
title | Foundations of Mac OS X Leopard security |
title_alt | Mac OS X Leopard security |
title_auth | Foundations of Mac OS X Leopard security |
title_exact_search | Foundations of Mac OS X Leopard security |
title_full | Foundations of Mac OS X Leopard security Charles S. Edge, Jr., William Barker, and Zack Smith ; technical reviewers, Mike Lee, Frank Pohlmann |
title_fullStr | Foundations of Mac OS X Leopard security Charles S. Edge, Jr., William Barker, and Zack Smith ; technical reviewers, Mike Lee, Frank Pohlmann |
title_full_unstemmed | Foundations of Mac OS X Leopard security Charles S. Edge, Jr., William Barker, and Zack Smith ; technical reviewers, Mike Lee, Frank Pohlmann |
title_short | Foundations of Mac OS X Leopard security |
title_sort | foundations of mac os x leopard security |
topic | Mac OS Operating systems (Computers) Macintosh (Computer) Security measures Computer security Computer networks Security measures Systèmes d'exploitation (Ordinateurs) Macintosh (Ordinateur) ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures Macintosh (Computer) ; Security measures Engineering & Applied Sciences Computer Science |
topic_facet | Mac OS Operating systems (Computers) Macintosh (Computer) Security measures Computer security Computer networks Security measures Systèmes d'exploitation (Ordinateurs) Macintosh (Ordinateur) ; Sécurité ; Mesures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures Macintosh (Computer) ; Security measures Engineering & Applied Sciences Computer Science |
work_keys_str_mv | AT edgecharless foundationsofmacosxleopardsecurity AT barkerwilliam foundationsofmacosxleopardsecurity AT smithzack foundationsofmacosxleopardsecurity AT leemike foundationsofmacosxleopardsecurity AT pohlmannfrank foundationsofmacosxleopardsecurity AT edgecharless macosxleopardsecurity AT barkerwilliam macosxleopardsecurity AT smithzack macosxleopardsecurity AT leemike macosxleopardsecurity AT pohlmannfrank macosxleopardsecurity |