資料來源: Google Book
Mac OS X maximum security
- 作者: Ray, John,
- 其他作者: Ray, William.
- 出版: Indianapolis, Ind. : Sams ©2003.
- 稽核項: 1 online resource (xiii, 747 pages) :illustrations.
- 標題: Electronic books. , Macintosh (Ordinateur) Programmation. , Systèmes d'exploitation (Ordinateurs) , Macintosh (Ordinateur) , Macintosh (Computer) Programming. , Computer security. , Macintosh (Computer) , COMPUTERS , operating systems. , Sécurité informatique. , Electronic book. , Computer Security , Programming. , Programmation. , Mac OS. , Operating SystemsMacintosh. , Operating systems (Computers) , COMPUTERS Operating Systems -- Macintosh.
- ISBN: 0672323818 , 9780672323812
- ISBN: 0672323818
- 試查全文@TNUA:
- 附註: Includes bibliographical references (page 703) and index.
- 電子資源: https://dbs.tnua.edu.tw/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=128773
- 系統號: 005316542
- 資料類型: 電子書
- 讀者標籤: 需登入
- 引用網址: 複製連結
While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point. Yet most Mac OS X books are generally quite simplistic -- with the exception of the author's "Mac OS X Unleashed," the first book to address OS X's underlying BSD subsystem. "Maximum Mac OS X Security" takes a similar UNIX-oriented approach, going into significantly greater depth on OS X security topics: Setup basics, including Airport and network topology security. User administration and resource management with NetInfo. Types of attacks, how attacks work, and how to stop them. Network service security, such as e-mail, Web, and file sharing. Intrusion prevention and detection, and hands-on detection tools.
來源: Google Book
來源: Google Book
評分