Cover image for Mac OS X security
Title:
Mac OS X security
Author:
Potter, Bruce.
Personal Author:
Edition:
First edition.
Publication Information:
Indianapolis, Ind. : New Riders, [2003]

©2003
Physical Description:
xx, 385 pages : illustrations ; 24 cm.
Language:
English
Title Subject:
ISBN:
9780735713482
Format :
Book

Available:*

Library
Call Number
Material Type
Home Location
Status
Item Holds
Searching...
QA76.76.O63 P667 2003 Adult Non-Fiction Central Closed Stacks
Searching...

On Order

Summary

Summary

This text shows you how to prepare to defend and audit your Mac OS X network as well as avoid common mistakes that increase system vulnerability to attack.


Author Notes

Bruce Potter, Senior Software Security consultant at Cigital, Inc., is the founder of The Shmoo Group, an organization of security and cryptography professionals. He is also the founder and president of Capital Area Wireless Network, a nonprofit community wireless initiative based in Washington, DC. He has spoken at the Black Hat and DefCon conferences.

Preston Norvell is a long-standing member of the Shmoo group and the originator of MacSecurity.org, a Shmoo Group-sponsored organization specializing in Mac OS security. By day he is a Project and Security Engineer for Mercury Data Group.

Brian Wotring is an independent software engineer and founder of knowngoods.org, an online database of file signatures. He is also the author of Osiris, a host integrity management application. An active member of The Shmoo Group, Brian has authored and ported many security related applications to Mac OS X and Mac OS X Server.


Table of Contents

Introduction
Part I The Basics
1 Security Foundations
2 Installation
Part II System Security
3 OS X Client General Practices
4 What's This UNIX Thing?
5 User Applications
Part III Network Services
6 Internet Services
7 File Sharing
8 Network Protection
Part IV Enterprise Security
9 Enterprise Host Configuration and Integration
10 Enterprise Directory Integration
Part V Auditing and Forensics
11 Auditing
12 Forensics
13 Incident Handling
Appendix A SUID and SGID Files
Appendix B CDSA
Appendix C| Further Reading