Flylib.com
Apple Training Series: Mac OS X System Administration Reference, Volume 1
Apple Training Series: Mac OS X System Administration Reference, Volume 1
ISBN: 032136984X
EAN: 2147483647
Year: 2005
Pages: 258
Authors:
Schoun Regan
BUY ON AMAZON
Apple Training Series: Mac OS X System Administration Reference, Volume 1
Table of Contents
Copyright
Acknowledgments
Getting Started
The Methodology
Apple Certification Program
Part 1: Directory Services Administration
Lesson1.Understanding Directory Services
Before Directory Services: Separate Files
After Directory Services: Solidified Data Structure
Defining Directory-Services Terminology
Managing Directory Information
Creating User Accounts and Exploring Directory Services
What You ve Learned
Lesson Review
Lesson2.Accessing Local Directory Services
Understanding Local Data Stores
Modifying the NetInfo Database
Configuring the DirectoryService Process
Defining Search Policies
DirectoryService Troubleshooting
Working With DirectoryService Plug-ins
Understanding lookupd
What You ve Learned
Lesson Review
Lesson3.Accessing Mac OS X Server Directory Services
Understanding LDAP
Using the LDAPv3 Plug-in
Understanding Similar LDAP Attributes
Working With Mount Records
Troubleshooting Home Directories
What You ve Learned
Lesson Review
Lesson4.Integrating Mac OS X With Third-Party Directory Services
Choosing a Third-Party Network Directory Service
LDAP Integration Methodology and Workflow
Integrating Specific Records With Third-Party LDAP Directories
Working With Home Folders and LDAP
Troubleshooting Integration
What You ve Learned
Lesson Review
Lesson5.Integrating Mac OS X With Active Directory
Understanding Mac OS X and Active Directory
More Integration With Active Directory
Behind the Scenes: Active Directory Bind
Supplementing Active Directory With Mac OS X Server
What You ve Learned
Lesson Review
Lesson6.Kerberos Fundamentals
Understanding Kerberos Basics
Configuring Kerberos on Mac OS X
Troubleshooting Kerberos
Identification and Authorization
What You ve Learned
Lesson Review
Lesson7.Hosting OpenLDAP
Open Directory Service Configuration
Managing Directory-Service Data
Tuning the Open Directory Server
Troubleshooting LDAP Connections
What You ve Learned
Lesson Review
Lesson8.Providing Single Sign-on Authentication
Providing Kerberos Authentication
Understanding KDC Architecture
Configuring the Open Directory Password Server
Troubleshooting
What You ve Learned
Lesson Review
Lesson9.Integrating With Kerberos
Accessing Kerberized Services
Integrating With Third-Party Kerberos Servers
What You ve Learned
Lesson Review
Lesson10.Replication
Understanding Open Directory Replication
Maintaining a Replication System
What You ve Learned
Lesson Review
Lesson11.Planning and Deploying Directory Services
Sharing Directory Data
What You ve Learned
Lesson Review
Part 2: Security Administration
Lesson12.Mac OS X Security Overview
Understanding Common Data Security Architecture
Understanding Mac OS X Authorization Philosophy
Developing an IT Security Risk Analysis
What You ve Learned
Lesson Review
Lesson13.Securing the Local System
Ensuring Physical Security
Implementing Open Firmware Security
Creating a Secure Mac OS X Installation
Using the Setup Assistant
Securing Local Accounts
Installing Updates and Security Patches
Choosing Mac OS 9 (Classic) Security Options
Establishing Local Operating-System Security
Configuring a Client Network
Using FileVault
What You ve Learned
Lesson Review
Lesson14.Optimizing Data Confidentiality
Securing File Systems Permissions
Working With Access Control Lists
Understanding Keychain Security
Using Encrypted Disk Images
Enabling FileVault
Performing Additional Data Security Measures
What You ve Learned
Lesson Review
Lesson15.Mobility Security Concerns
Choosing Mobile Technologies
Identifying the Security Risks of Mobility
Implementing Bluetooth Security in Mac OS X
Implementing WLAN Security in Mac OS X
What You ve Learned
Lesson Review
Lesson16.Secure Network Connections
Understanding Network Services
Using Telnet to Test Socket Connectivity
Understanding SSH
Understanding VPN
What You ve Learned
Lesson Review
Lesson17.Secure Authentication
Configuring Secure Client Authentication
Authenticating via a Trusted Third Party
Managing Certificates on Mac OS X
What You ve Learned
Lesson Review
Lesson18.Secure Network Configuration
Designing a Secure Network
Using Network Security Mechanisms
Configuring Network Security
What You ve Learned
Lesson Review
Lesson19.Mail Security
Protecting Your Email Client
Protecting Your Email Servers
Ensuring Physical Security
What You ve Learned
Lesson Review
Lesson20.Web Security
Securing the Web Client
Setting Up Secure Web Services
Establishing a Secure Website Using SSL
Configuring Secure WebDAV
Setting Up a Filtering Proxy Server
What You ve Learned
Lesson Review
Lesson21.Maintenance, Intrusion Detection, and Auditing
Differentiating Between Types of Malicious Software
Understanding Infection Effects
Protecting Against Malicious Software
Understanding Maintenance
Detecting Intrusions
Auditing Mac OS X
What You ve Learned
Lesson Review
Part 3: Networking and File Services
Lesson22.Unmanaged Networking
Understanding Unmanaged and Managed Networking
A Look Back at AppleTalk
Introducing Bonjour
Adopting Bonjour
Troubleshooting Bonjour
What You ve Learned
Lesson Review
Lesson23.IP Networks and Services
Understanding IP Addressing
Advanced IP Addressing
Providing Network Services
Troubleshooting Networks
What You ve Learned
Lesson Review
Lesson24.Mac OS X Network Architecture
Networking in Mac OS X
Dynamic Network Configuration
What You ve Learned
Lesson Review
Lesson25.Resolving Network System Issues
Troubleshooting a Network
Monitoring a Network
What You ve Learned
Lesson Review
Lesson26.Maintaining Local Volumes and Files
Understanding File-System Formats
Identifying Resource and Data Forks
Aliases and Symbolic Links
Mounting and Disk Arbitration
Monitoring and Troubleshooting
What You ve Learned
Lesson Review
Lesson27.File Permissions and Flags
Understanding Permissions
Understanding Access Control Lists
Protecting Files With Flags
Monitoring and Troubleshooting Permissions and Flags
What You ve Learned
Lesson Review
Lesson28.Network File Services
Understanding Personal File Sharing
Understanding Windows Sharing
Getting FTP Access
Monitoring and Troubleshooting
What You ve Learned
Lesson Review
Lesson29.Mounting Remote File Systems
Understanding User Mounting
Troubleshooting
What You ve Learned
Lesson Review
Part 4: Appendixes
Appendix A. vi Reference
vi Editor
Appendix B. Basic Command-Line Reference
Finding Files Using locate and find
Managing Processes From the Command Line
Monitoring System Usage
Managing Disks and Volumes
Working With the Command Line and the GUI
Searching Text Files Using pipe and grep
Additional Shell Filename Wildcards
Additional Mac OS XSpecific Commands
What You ve Learned
Lesson Review
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Apple Training Series: Mac OS X System Administration Reference, Volume 1
ISBN: 032136984X
EAN: 2147483647
Year: 2005
Pages: 258
Authors:
Schoun Regan
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Filtering for Null Values
Updating Server Data Using a Web Service
Creating Constraints, PrimaryKeys, Relationships Based on Multiple Columns
Transforming a DataSet Using XSLT
Improving DataReader Performance with Column Ordinals
CISSP Exam Cram 2
APPLICATION AND SYSTEMS-DEVELOPMENT SECURITY
The Risk of Poor Security Management
Answers to Exam Prep Questions
Hack Attacks
Common Attacks
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Leveraging Copy, Cut, Paste, and Paste Special
Importing Data from Access Databases
Introduction
Changing the Type of an Existing Chart
Exploring Resource Allocation Optimization Problems
802.11 Wireless Networks: The Definitive Guide, Second Edition
Challenges for the MAC
EAP Methods
11g: The Extended-Rate PHY (ERP)
11 Hardware
Logical Wireless Network Architecture
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
The China Phenomenon
Americanization versus Asianization
Culture and Globalization
Appendix B Leadership Test
Programming .Net Windows Applications
The .NET Framework
Modal Versus Modeless
DialogResult
The Analog Clock Project
Creating Custom Controls from Scratch
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies