LEADER 01159nam a2200265 i 4500 001 991001357079707536 005 20020502191237.0 008 980311s1996 it ||| | ita 020 $a8824419291 035 $ab11501133-39ule_inst 035 $aPRUMB59506$9ExL 040 $aScuola per assistenti sociali$bita 100 1 $aIzzo, Fausto$0145303 245 13$aLe nuove norme sull'usura :$bprofili penali e civili :$bcommento sistematico alla L. 7.3.1996 n. 108 con vademecum per le vittime dell'usura e breve appendice legislativa /$cFausto Izzo, Mariarosaria Solombrino 260 $aNapoli :$bEsselibri-Simone,$cstampa 1996 300 $a144 p. ;$c22 cm. 490 0 $aEdizioni Simone ;$v192 650 4$aUsura$xLegislazione 700 1 $aSolombrino, Mariarosaria$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0238811 907 $a.b11501133$b01-03-17$c01-07-02 912 $a991001357079707536 945 $aLE024 DIR PEN VII 16$g1$i2024000006921$lle021$nex DUSS$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i11694452$z01-07-02 996 $aNuove norme sull'usura$9656893 997 $aUNISALENTO 998 $ale021$b01-01-98$cm$da $e-$fita$git $h3$i1 LEADER 04377nam 22006495 450 001 9910254755903321 005 20251214170257.0 010 $a9781484217122 010 $a1484217128 024 7 $a10.1007/978-1-4842-1712-2 035 $a(CKB)3710000000541969 035 $a(EBL)4306453 035 $a(SSID)ssj0001597239 035 $a(PQKBManifestationID)16297633 035 $a(PQKBTitleCode)TC0001597239 035 $a(PQKBWorkID)14885253 035 $a(PQKB)11123233 035 $a(DE-He213)978-1-4842-1712-2 035 $a(MiAaPQ)EBC4306453 035 $a(CaSebORM)9781484217122 035 $a(PPN)190882107 035 $a(OCoLC)936182987 035 $a(OCoLC)ocn936182987 035 $a(EXLCZ)993710000000541969 100 $a20151230d2016 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aEnterprise Mac security $eEl capitan /$fCharles Edge, Daniel O'Donnell 205 $aThird edition. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2016. 215 $a1 online resource (522 p.) 300 $aIncludes index. 311 08$a9781484217115 311 08$a148421711X 327 $a1. Security Quick-Start -- 2. Services, Daemons, and Processes -- 3. Securing User Accounts -- 4. File System Permissions -- 5. Reviewing Logs and Monitoring -- 6. Application Signing and Sandbox -- 7. Securing Web Browsers and E-mail -- 8. Malware Security: Combating Viruses, Worms, and Root Kits -- 9. Encrypting Files and Volumes -- 10. Securing Network Traffic -- 11. Setting Up the Mac OS X Firewall -- 12. Securing a Wireless Network -- 13.File Services -- 14. Web Site Security -- 15. Remote Connectivity -- 16. Server Security -- 17. Network Scanning, Intrusion Detection, and Intrusion Prevention Tools -- 18. Backup and Fault Tolerance -- 19. Forensics -- 20. Appendix A -- 21. Appendix B -- 22. Appendix C. 330 $aEnterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new 10.11 operating system. A common misconception in the Mac community is that Mac?s operating system is more secure than others. While this might be have been true in certain cases, security on the Mac has always still been a crucial issue. With the release of OS X 10.11, the operating system is taking large strides in getting even more secure. Even still, when sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats, whether these have been exploited or not. This book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience. The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security. What You Will Learn The newest security techniques on Mac OS X from the best and brightest Security details of Mac OS X for the desktop and server, and how to secure these systems The details of Mac forensics and Mac hacking How to tackle Apple wireless security Who This Book Is For This book is for new users, switchers, power users, and administrators that need to make sure their Mac systems are secure. 517 1 $aSecuring El Capitan in the enterprise and beyond 606 $aApple computers 606 $aComputer science 606 $aApple and iOS$3https://scigraph.springernature.com/ontologies/product-market-codes/I29020 606 $aComputer Science, general$3https://scigraph.springernature.com/ontologies/product-market-codes/I00001 615 0$aApple computers. 615 0$aComputer science. 615 14$aApple and iOS. 615 24$aComputer Science, general. 676 $a004 700 $aEdge$b Charles S.$cJr.,$4aut$4http://id.loc.gov/vocabulary/relators/aut$00 702 $aO'Donnell$b Daniel$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bUMI 801 1$bUMI 906 $aBOOK 912 $a9910254755903321 996 $aEnterprise Mac security$93569166 997 $aUNINA