The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

Book details of 'Mac OS X Security'

Cover of Mac OS X Security
TitleMac OS X Security
Author(s)Bruce Potter, Preston Norvell, Brian Wotring
ISBN0735713480
LanguageEnglish
PublisherNew Riders
Web links for this book
Search at Bookcrossing.com
Wikipedia booksources
Shop for this book
At Amazon.co.uk
As an Amazon Associate I earn from qualifying purchases

Back to shelf Computer security
Back to shelf Operating systems

Score:

virtualbookcase.com score: 5.0 *****  Vote for this book

The Virtual Bookcase Reviews of 'Mac OS X Security':

Reviewer Rob Slade wrote:
Part one covers the basics. Chapter one provides a very brief look at foundational security tools, and some UNIX user and group information. Installation, in chapter two, has a little information about BSD services and filesystems, but otherwise is a fairly standard run through the installation process. Part two is about system security. Chapter three looks at general security practices for the Mac OS X client, in terms of boot and screensaver passwords and user setup. There is a review and some expansion (additional commands) of the UNIX material from chapter one in chapter four. The user applications discussed in chapter five mostly have to do with the keychain, email, and Web browser. Part three deals with network security. Internet services, in chapter six, concentrates on the configuration of the Apache Web server. A variety of file sharing options are discussed in chapter seven. Chapter eight looks at network services in terms of firewalls, virtual private networks (VPNs), and wireless networking, and has a rather odd inclusion of antivirus tools. The concepts are good but the details are weak. Enterprise security is in part four. Chapter nine looks at the host configuration very briefly, mentioning the login banner and Kerberos. Directory services and Open Directory are reviewed in chapter ten. Part five examines auditing and forensics. (Get it? Never mind ...) Chapter eleven discusses various logs and options for auditing. The Osiris change detection program and TASK (The @stake Sleuth Toolkit) are described in chapter twelve. Chapter thirteen closes off with a generic look at incident response. Once again Mac users get a rather lackluster resource for security, which is a pity, since they now have a reasonably secure underpinning to the system. copyright Robert M. Slade, 2003

Add my review for Mac OS X Security

Book description:

Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.

Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2020 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement