| | Copyright |
| | Preface |
| | | Audience |
| | | How This Book Is Organized |
| | | How to Use This Book |
| | | Compatibility |
| | | Conventions Used in This Book |
| | | Using Code Examples |
| | | Safari® Enabled |
| | | How to Contact Us |
| | | Acknowledgments |
| | | Acknowledgments from the First Edition |
| | Chapter 1. Where It All Came From |
| | | Section 1.1. The Classic Mac OS |
| | | Section 1.2. System 7 |
| | | Section 1.3. Copland |
| | | Section 1.4. NEXTSTEP |
| | | Section 1.5. Rhapsody |
| | | Section 1.6. Continued Development of the Classic Mac OS |
| | | Section 1.7. Mac OS X 10.0 |
| | | Section 1.8. Mac OS X 10.1 |
| | | Section 1.9. Mac OS X 10.2 Jaguar |
| | | Section 1.10. Mac OS X Panther |
| | | Section 1.11. Mac OS X Tiger |
| | | Section 1.12. What Does the Future Hold? |
| | Chapter 2. Installing the System and Software |
| | | Section 2.1. Preparing to Install Tiger |
| | | Section 2.2. Installing Tiger |
| | | Section 2.3. The Software of Mac OS X |
| | | Section 2.4. Staying Up-to-Date |
| | | Section 2.5. Further Explorations |
| | Chapter 3. Lay of the Land |
| | | Section 3.1. The World's Most Advanced Operating System |
| | | Section 3.2. Filesystem Hierarchy |
| | | Section 3.3. The Many Roots of the Finder |
| | | Section 3.4. Filesystem Domains |
| | | Section 3.5. The Library |
| | | Section 3.6. Bundles |
| | | Section 3.7. Further Explorations |
| | Chapter 4. The Terminal and Shell |
| | | Section 4.1. Terminal Overview |
| | | Section 4.2. Configuring and Using bash |
| | | Section 4.3. Using Other Shells |
| | | Section 4.4. Getting Help |
| | | Section 4.5. Editing Text Files |
| | | Section 4.6. Further Explorations |
| | Chapter 5. System Startup and Login |
| | | Section 5.1. The Hardware Boot Process |
| | | Section 5.2. The Operating System Boot Process |
| | | Section 5.3. Logging In |
| | | Section 5.4. Logging Out |
| | | Section 5.5. Shutting Down the System |
| | | Section 5.6. Energy Preferences |
| | | Section 5.7. Further Explorations |
| | Chapter 6. Users and Groups |
| | | Section 6.1. What Is a User Anyway? |
| | | Section 6.2. Managing Users |
| | | Section 6.3. Nonhuman Users |
| | | Section 6.4. Further Explorations |
| | Chapter 7. Open Directory |
| | | Section 7.1. Open Directory in Action |
| | | Section 7.2. Directory Services Defined |
| | | Section 7.3. Directory Domains |
| | | Section 7.4. The Local Domain and NetInfo |
| | | Section 7.5. Configuring Shared Domains |
| | | Section 7.6. Kerberos and Single Sign-on |
| | | Section 7.7. Command-Line Open Directory Tools |
| | | Section 7.8. Further Explorations |
| | Chapter 8. Files and Permissions |
| | | Section 8.1. Finding Files |
| | | Section 8.2. Owners and Access |
| | | Section 8.3. Metadata and File Attributes |
| | | Section 8.4. Further Explorations |
| | Chapter 9. Disks and Filesystems |
| | | Section 9.1. Filesystems |
| | | Section 9.2. Network-Based Filesystems |
| | | Section 9.3. Disk Utility |
| | | Section 9.4. Erasing and Formatting Disks |
| | | Section 9.5. Partitioning Disks |
| | | Section 9.6. RAID |
| | | Section 9.7. Disk Images |
| | | Section 9.8. Further Explorations |
| | Chapter 10. Printing |
| | | Section 10.1. Print System Overview |
| | | Section 10.2. Managing Printers |
| | | Section 10.3. Adding and Configuring Printers |
| | | Section 10.4. Anatomy of a Print Job |
| | | Section 10.5. PDF Services |
| | | Section 10.6. Printing from the Command Line |
| | | Section 10.7. Print Sharing |
| | | Section 10.8. Further Explorations |
| | Chapter 11. Networking |
| | | Section 11.1. The Internet Protocol |
| | | Section 11.2. Configuring IP Addresses |
| | | Section 11.3. Naming and DNS |
| | | Section 11.4. Private Networks and NAT |
| | | Section 11.5. Routing |
| | | Section 11.6. Active Network Connections |
| | | Section 11.7. AppleTalk |
| | | Section 11.8. Locations |
| | | Section 11.9. Using a Dial-Up Connection |
| | | Section 11.10. FireWire Networking |
| | | Section 11.11. Virtual Private Networks |
| | | Section 11.12. Firewalls |
| | | Section 11.13. Internet Connection Sharing |
| | | Section 11.14. Further Explorations |
| | Chapter 12. Monitoring the System |
| | | Section 12.1. About This Mac |
| | | Section 12.2. System Profiler |
| | | Section 12.3. Monitoring System Activity |
| | | Section 12.4. Monitoring Users |
| | | Section 12.5. Working with Processes |
| | | Section 12.6. Remote Maintenance |
| | | Section 12.7. Further Explorations |
| | Chapter 13. Automating Tasks |
| | | Section 13.1. The Importance of Time |
| | | Section 13.2. Using iCal to Schedule Tasks |
| | | Section 13.3. cron |
| | | Section 13.4. Automator |
| | | Section 13.5. Scripting |
| | | Section 13.6. Further Explorations |
| | Chapter 14. Preferences and Defaults |
| | | Section 14.1. Property Lists |
| | | Section 14.2. Where Preferences Are Stored |
| | | Section 14.3. Reading and Writing Preferences |
| | | Section 14.4. Determining Preference Keys |
| | | Section 14.5. Further Explorations |
| | Appendix A. Boot Command Keys |
| | Appendix B. Other Sources of Information |
| | | Section B.1. Books |
| | | Section B.2. Magazines |
| | | Section B.3. Mailing Lists |
| | | Section B.4. Web Sites |
| | About the Authors |
| | Colophon |
| | Index |