Flylib.com
Apple Training Series: Mac OS X System Administration Reference, Volume 1
Apple Training Series: Mac OS X System Administration Reference, Volume 1
ISBN: 032136984X
EAN: 2147483647
Year: 2005
Pages: 258
Authors:
Schoun Regan
BUY ON AMAZON
Apple Training Series: Mac OS X System Administration Reference, Volume 1
Table of Contents
Copyright
Acknowledgments
Getting Started
The Methodology
Apple Certification Program
Part 1: Directory Services Administration
Lesson1.Understanding Directory Services
Before Directory Services: Separate Files
After Directory Services: Solidified Data Structure
Defining Directory-Services Terminology
Managing Directory Information
Creating User Accounts and Exploring Directory Services
What You ve Learned
Lesson Review
Lesson2.Accessing Local Directory Services
Understanding Local Data Stores
Modifying the NetInfo Database
Configuring the DirectoryService Process
Defining Search Policies
DirectoryService Troubleshooting
Working With DirectoryService Plug-ins
Understanding lookupd
What You ve Learned
Lesson Review
Lesson3.Accessing Mac OS X Server Directory Services
Understanding LDAP
Using the LDAPv3 Plug-in
Understanding Similar LDAP Attributes
Working With Mount Records
Troubleshooting Home Directories
What You ve Learned
Lesson Review
Lesson4.Integrating Mac OS X With Third-Party Directory Services
Choosing a Third-Party Network Directory Service
LDAP Integration Methodology and Workflow
Integrating Specific Records With Third-Party LDAP Directories
Working With Home Folders and LDAP
Troubleshooting Integration
What You ve Learned
Lesson Review
Lesson5.Integrating Mac OS X With Active Directory
Understanding Mac OS X and Active Directory
More Integration With Active Directory
Behind the Scenes: Active Directory Bind
Supplementing Active Directory With Mac OS X Server
What You ve Learned
Lesson Review
Lesson6.Kerberos Fundamentals
Understanding Kerberos Basics
Configuring Kerberos on Mac OS X
Troubleshooting Kerberos
Identification and Authorization
What You ve Learned
Lesson Review
Lesson7.Hosting OpenLDAP
Open Directory Service Configuration
Managing Directory-Service Data
Tuning the Open Directory Server
Troubleshooting LDAP Connections
What You ve Learned
Lesson Review
Lesson8.Providing Single Sign-on Authentication
Providing Kerberos Authentication
Understanding KDC Architecture
Configuring the Open Directory Password Server
Troubleshooting
What You ve Learned
Lesson Review
Lesson9.Integrating With Kerberos
Accessing Kerberized Services
Integrating With Third-Party Kerberos Servers
What You ve Learned
Lesson Review
Lesson10.Replication
Understanding Open Directory Replication
Maintaining a Replication System
What You ve Learned
Lesson Review
Lesson11.Planning and Deploying Directory Services
Sharing Directory Data
What You ve Learned
Lesson Review
Part 2: Security Administration
Lesson12.Mac OS X Security Overview
Understanding Common Data Security Architecture
Understanding Mac OS X Authorization Philosophy
Developing an IT Security Risk Analysis
What You ve Learned
Lesson Review
Lesson13.Securing the Local System
Ensuring Physical Security
Implementing Open Firmware Security
Creating a Secure Mac OS X Installation
Using the Setup Assistant
Securing Local Accounts
Installing Updates and Security Patches
Choosing Mac OS 9 (Classic) Security Options
Establishing Local Operating-System Security
Configuring a Client Network
Using FileVault
What You ve Learned
Lesson Review
Lesson14.Optimizing Data Confidentiality
Securing File Systems Permissions
Working With Access Control Lists
Understanding Keychain Security
Using Encrypted Disk Images
Enabling FileVault
Performing Additional Data Security Measures
What You ve Learned
Lesson Review
Lesson15.Mobility Security Concerns
Choosing Mobile Technologies
Identifying the Security Risks of Mobility
Implementing Bluetooth Security in Mac OS X
Implementing WLAN Security in Mac OS X
What You ve Learned
Lesson Review
Lesson16.Secure Network Connections
Understanding Network Services
Using Telnet to Test Socket Connectivity
Understanding SSH
Understanding VPN
What You ve Learned
Lesson Review
Lesson17.Secure Authentication
Configuring Secure Client Authentication
Authenticating via a Trusted Third Party
Managing Certificates on Mac OS X
What You ve Learned
Lesson Review
Lesson18.Secure Network Configuration
Designing a Secure Network
Using Network Security Mechanisms
Configuring Network Security
What You ve Learned
Lesson Review
Lesson19.Mail Security
Protecting Your Email Client
Protecting Your Email Servers
Ensuring Physical Security
What You ve Learned
Lesson Review
Lesson20.Web Security
Securing the Web Client
Setting Up Secure Web Services
Establishing a Secure Website Using SSL
Configuring Secure WebDAV
Setting Up a Filtering Proxy Server
What You ve Learned
Lesson Review
Lesson21.Maintenance, Intrusion Detection, and Auditing
Differentiating Between Types of Malicious Software
Understanding Infection Effects
Protecting Against Malicious Software
Understanding Maintenance
Detecting Intrusions
Auditing Mac OS X
What You ve Learned
Lesson Review
Part 3: Networking and File Services
Lesson22.Unmanaged Networking
Understanding Unmanaged and Managed Networking
A Look Back at AppleTalk
Introducing Bonjour
Adopting Bonjour
Troubleshooting Bonjour
What You ve Learned
Lesson Review
Lesson23.IP Networks and Services
Understanding IP Addressing
Advanced IP Addressing
Providing Network Services
Troubleshooting Networks
What You ve Learned
Lesson Review
Lesson24.Mac OS X Network Architecture
Networking in Mac OS X
Dynamic Network Configuration
What You ve Learned
Lesson Review
Lesson25.Resolving Network System Issues
Troubleshooting a Network
Monitoring a Network
What You ve Learned
Lesson Review
Lesson26.Maintaining Local Volumes and Files
Understanding File-System Formats
Identifying Resource and Data Forks
Aliases and Symbolic Links
Mounting and Disk Arbitration
Monitoring and Troubleshooting
What You ve Learned
Lesson Review
Lesson27.File Permissions and Flags
Understanding Permissions
Understanding Access Control Lists
Protecting Files With Flags
Monitoring and Troubleshooting Permissions and Flags
What You ve Learned
Lesson Review
Lesson28.Network File Services
Understanding Personal File Sharing
Understanding Windows Sharing
Getting FTP Access
Monitoring and Troubleshooting
What You ve Learned
Lesson Review
Lesson29.Mounting Remote File Systems
Understanding User Mounting
Troubleshooting
What You ve Learned
Lesson Review
Part 4: Appendixes
Appendix A. vi Reference
vi Editor
Appendix B. Basic Command-Line Reference
Finding Files Using locate and find
Managing Processes From the Command Line
Monitoring System Usage
Managing Disks and Volumes
Working With the Command Line and the GUI
Searching Text Files Using pipe and grep
Additional Shell Filename Wildcards
Additional Mac OS XSpecific Commands
What You ve Learned
Lesson Review
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Apple Training Series: Mac OS X System Administration Reference, Volume 1
ISBN: 032136984X
EAN: 2147483647
Year: 2005
Pages: 258
Authors:
Schoun Regan
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Ethical Hackers
Study Strategies
Protocols, Standards, and Applications
Sniffers
Practice Exam Questions
The .NET Developers Guide to Directory Services Programming
Property and Method Overview
Foreign Security Principals
LDP
BeaverTail LDAP Browser
Appendix C. Troubleshooting and Help
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 6. Share Google Maps
Hack 20. Track Official Storm Reporting
Hack 29. Find the Best Gasoline Prices
Hack 37. View Your GPS Tracklogs in Google Maps
Hack 48. Tell Your Communitys Story
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 42. Secure Your Linux Network with WPA
Hack 59. Scan for Wireless Networks Automatically
Appendix A. Wireless Standards
Section A.4. 802.11g: Like 802.11b, only Faster
Section B.3. Antenna Guide
PMP Practice Questions Exam Cram 2
Answers and Explanations
Answers and Explanations
Exam Prep Questions
Answers and Explanations
Exam Prep Questions
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Why Office Programming?
Conclusion
Working with the Application Object
Properties and Methods Common to Outlook Items
Writing a COM Add-In Using Visual Studio
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies