Matches in SemOpenAlex for { <https://semopenalex.org/work/W567562184> ?p ?o ?g. }
Showing items 1 to 69 of
69
with 100 items per page.
- W567562184 abstract "Introduction. I. MAC OS X SECURITY BASICS: LEARNING TO THINK SECURE. 1. An Introduction to Mac OS X Security. What Is Security? Traditional Mac OS Versus Mac OS X. Understanding the Threat. Summary. 2. Thinking Secure: Security Philosophy and Physical Concerns. Physical System Vulnerabilities. Server Location and Physical Access. Server and Facility Location. Physical Access to the Facility. Computer Use Policies. Physical Security Devices. Network Considerations. Summary. 3. People Problems: Users, Intruders, and the World Around Them. Your Users: People with Whom You Share Your Computer. The Bad Guys: People Who Would Do Your System Harm. Everybody Else. Summary. II. VULNERABILITIES AND EXPOSURES: HOW THINGS DON'T WORK, AND WHY. 4. Theft and Destruction of Property: Data Attacks. Keeping Data Secret: Cryptography, Codes, and Ciphers. Data-Divulging Applications. Steganography and Steganalysis: Hiding Data in Plain Sight, and How to Find and Eliminate It. Summary. 5. Picking Locks: Password Attacks. Typical Password Mechanisms. Testing Password Security. Improving Password Security, and Alternatives to the Standard Password Mechanisms in Mac OS X. Summary. 6. Evil Automatons: Malware, Trojans, Viruses, and Worms. Defining Software Behavioral Space. Malware. Malware Threats. Solving the Problem. Summary. 7. Eavesdropping and Snooping for Information: Sniffers and Scanners. Eavesdropping and Information Gathering. Monitoring Traffic with tcpdump. Sniffing Around with Ettercap. Network Surveys with NMAP. Other Information-Gathering Tools. Ethics of Information Gathering. Additional Resources. Summary. 8. Impersonation and Infiltration: Spoofing. Spoofing Attacks. Spoofing Defenses. Summary. 9. Everything Else. DoS. Buffer Overflows. Session Hijacking. Everything Else. Additional Resources. Summary. III. SPECIFIC MAC OS X RESOURCES AND HOW TO SECURE THEM: SECURITY TIPS, TRICKS, AND RECIPES. 10. User, Environment, and Application Security. Adding a New User. Using the NetInfo Database to Customize a User. Sane User Account Management. Skeleton User Accounts. Command-Line Administration Tools. Restricting User Capabilities. Summary. 11. Introduction to Mac OS X Network Services. What Is a Network Service? Network Service Vulnerabilities. Controlling Mac OS X Network Service Processes. Protecting inetd with TCP Wrappers. Increasing Security with xinetd. Summary. 12. FTP Security. FTP Vulnerabilities. Activating the FTP Server. Configuring the Default lukemftpd FTP Server. Setting Up Anonymous FTP. Replacing the Mac OS X FTP Server. Alternatives to FTP. Summary. 13. Mail Server Security. Basic Vulnerabilities. Sendmail. Activating Sendmail on Mac OS X. Protecting Sendmail. Updating Your Sendmail Installation. Postfix as an Alternative. Installing Postfix. Protecting Postfix. Delivering Mail-UW IMAP. Summary. 14. Remote Access: Secure Shell, VNC, Timbuktu, Apple Remote Desktop. What Is SSH? SSH Vulnerabilities. Vulnerabilities in telnet and rlogin. Activating SSH. Advanced SSH Features. GUI Access Methods. Summary. 15. Web Server Security. Introducing Apache. SSL-Protected Apache. Additional Resources. Summary. 16. File Sharing Security. Apple Filing Protocol. WebDAV. Sharing Files with Samba. Common Unix Printing System. Other Resources. Summary. IV. PREVENTION, DETECTION, AND REACTION TO ATTACKS: HEALTH CARE AND CHECKUPS FOR YOUR MACHINE. 17. Blocking Network Access: Firewalls. Firewalling. Built-In GUI Mac OS X Firewall Tools. Built-In Command-Line Mac OS X Firewall Tools. Firewall Hardware. Firewall Resources. Summary. 18. Alarm Systems: Intrusion Detection. What Is Intrusion Detection? Psionic PortSentry. Snort. IDS Resources. Summary. 19. Logs and User Activity Accounting. The Role of Logs. User Logins and Accounting. Automated Log Monitoring: LogSentry. Common System Log Changes. Summary. 20. Disaster Planning and Recovery. What Is Disaster Recovery and Why Do You Need It? Creating a Disaster Recovery Plan. Mac OS X Backup Software. Synchronizing Files: rsync. Summary. V. APPENDIXES. Appendix A. Glossary. Appendix B. Security Resources. Appendix C. Secure Web Development. Web Development Risks. Protecting Your Web Applications. Adding and Using suEXEC. Testing for Known CGI Vulnerabilities: Whisker. Additional Resources. Index." @default.
- W567562184 created "2016-06-24" @default.
- W567562184 creator A5041414629 @default.
- W567562184 creator A5049477607 @default.
- W567562184 date "2003-04-01" @default.
- W567562184 modified "2023-09-27" @default.
- W567562184 title "Mac OS X Maximum Security" @default.
- W567562184 hasPublicationYear "2003" @default.
- W567562184 type Work @default.
- W567562184 sameAs 567562184 @default.
- W567562184 citedByCount "0" @default.
- W567562184 crossrefType "book" @default.
- W567562184 hasAuthorship W567562184A5041414629 @default.
- W567562184 hasAuthorship W567562184A5049477607 @default.
- W567562184 hasConcept C108827166 @default.
- W567562184 hasConcept C109297577 @default.
- W567562184 hasConcept C110875604 @default.
- W567562184 hasConcept C113328881 @default.
- W567562184 hasConcept C136764020 @default.
- W567562184 hasConcept C167900197 @default.
- W567562184 hasConcept C201980515 @default.
- W567562184 hasConcept C2776788033 @default.
- W567562184 hasConcept C35341882 @default.
- W567562184 hasConcept C38652104 @default.
- W567562184 hasConcept C41008148 @default.
- W567562184 hasConcept C522325796 @default.
- W567562184 hasConcept C541664917 @default.
- W567562184 hasConcept C86255107 @default.
- W567562184 hasConceptScore W567562184C108827166 @default.
- W567562184 hasConceptScore W567562184C109297577 @default.
- W567562184 hasConceptScore W567562184C110875604 @default.
- W567562184 hasConceptScore W567562184C113328881 @default.
- W567562184 hasConceptScore W567562184C136764020 @default.
- W567562184 hasConceptScore W567562184C167900197 @default.
- W567562184 hasConceptScore W567562184C201980515 @default.
- W567562184 hasConceptScore W567562184C2776788033 @default.
- W567562184 hasConceptScore W567562184C35341882 @default.
- W567562184 hasConceptScore W567562184C38652104 @default.
- W567562184 hasConceptScore W567562184C41008148 @default.
- W567562184 hasConceptScore W567562184C522325796 @default.
- W567562184 hasConceptScore W567562184C541664917 @default.
- W567562184 hasConceptScore W567562184C86255107 @default.
- W567562184 hasLocation W5675621841 @default.
- W567562184 hasOpenAccess W567562184 @default.
- W567562184 hasPrimaryLocation W5675621841 @default.
- W567562184 hasRelatedWork W100061603 @default.
- W567562184 hasRelatedWork W1563848652 @default.
- W567562184 hasRelatedWork W1963643221 @default.
- W567562184 hasRelatedWork W2026256961 @default.
- W567562184 hasRelatedWork W2148176135 @default.
- W567562184 hasRelatedWork W2184159580 @default.
- W567562184 hasRelatedWork W2622765738 @default.
- W567562184 hasRelatedWork W2789573968 @default.
- W567562184 hasRelatedWork W2972429994 @default.
- W567562184 hasRelatedWork W2993962809 @default.
- W567562184 hasRelatedWork W3023859395 @default.
- W567562184 hasRelatedWork W3041730452 @default.
- W567562184 hasRelatedWork W3112891218 @default.
- W567562184 hasRelatedWork W3158550558 @default.
- W567562184 hasRelatedWork W564464612 @default.
- W567562184 hasRelatedWork W570047390 @default.
- W567562184 hasRelatedWork W603372082 @default.
- W567562184 hasRelatedWork W646685644 @default.
- W567562184 hasRelatedWork W65810077 @default.
- W567562184 hasRelatedWork W9622030 @default.
- W567562184 isParatext "false" @default.
- W567562184 isRetracted "false" @default.
- W567562184 magId "567562184" @default.
- W567562184 workType "book" @default.