Library Logo

Enterprise Mac security : (Record no. 1297)

000 -LEADER
fixed length control field 02187cam a22003375a 4500
001 - CONTROL NUMBER
control field 16648053
003 - CONTROL NUMBER IDENTIFIER
control field BD-DhUL
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140808100227.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110211s2010 nyua 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011280458
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781430227304
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1430227303
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number ENT
245 00 - TITLE STATEMENT
Title Enterprise Mac security :
Remainder of title MAC OS X Snow Leopard /
Statement of responsibility, etc. Charles Edge, William Barker, et al.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. Apress,
Date of publication, distribution, etc. 2010.
300 ## - PHYSICAL DESCRIPTION
Extent 620 p. :
Other physical details ill. ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price type code US$
Price amount 40.49
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note PART I: The big picture. Security quick-start ; Services, daemons, and processes ; Securing user accounts ; File system permissions ; Review logs and monitoring -- PART II: Securing the ecosystem. Application signing and sandbox ; Securing web browsers and e-mail ; Malware security: combating viruses, worms, and root kits ; Encrypting files and volumes -- PART III: Network traffic. Securing network traffic ; Setting up the Mac OS X firewall ; Securing a wireless network -- PART IV: Sharing. File services ; Web site security ; Remote connectivity ; Server security -- PART V: Securing the workplace. Newtork scanning, intrusion detection, and intrusion prevention tools ; Backup and fault tolerance ; Forensics -- Appendix A: Xsan security -- Appendix B: InfoSec acceptable use policy -- Appendix C: CDSA -- Appendix D: Introduction to cryptography.
520 ## - SUMMARY, ETC.
Summary, etc. Contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new Snow Leopard operating system. You'll learn the newest security techniques on Mac OS X, details of the new Mac OS X Snow Leopard Operating System for the desktop and server, and how to secure these systems, Mac forensics and Mac hacking, Apple wireless security, and more.
521 8# - TARGET AUDIENCE NOTE
Target audience note User level: Beginning -Intermediate.
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Mac OS.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Edge, Charles S.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Barker, William.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 0
b ibc
c origres
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Price effective from Date last seen Permanent Location Not for loan Date acquired Source of classification or shelving scheme Koha item type Lost status Withdrawn status Source of acquisition Collection code Damaged status Shelving location Barcode Current Location Full call number
2014-08-082014-08-08Dhaka University Science Library 2012-10-16 Books  PurchasedNon Fiction General Stacks475848Dhaka University Science Library005.8 ENT
Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login