Cover image for Mac Security Bible.
Mac Security Bible.
Title:
Mac Security Bible.
Author:
Kissell, Joe.
ISBN:
9780470602966
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (848 pages)
Series:
Bible ; v.670

Bible
Contents:
Mac® Security Bible -- Acknowledgments -- Introduction -- Contents at a Glance -- Contents -- Part I: Mac Security Basics -- Chapter 1: Mac Security Overview -- Mac Security: Myth versus Fact -- Major Mac OS X Security Features -- Privacy versus Security -- Weighing Convenience against Security -- Understanding Your Risks -- The Theory and Practice of Best Practices -- Seven Things You Should Do Right Now -- Summary -- Chapter 2: Securing Your Mac against Theft -- Security Cables and Locks -- Laptop Lockers -- Other Theft Deterrents -- Marking a Mac for Recovery -- Tracking and Recovering Stolen Macs -- Summary -- Chapter 3: Working with User Accounts -- How Accounts Affect Security -- Understanding POSIX Permissions -- Types of Accounts -- Configuring an Account -- Adjusting Login Options -- Using Parental Controls -- Using the Sudo Command -- Using Access Control Lists -- Summary -- Chapter 4: Configuring Basic Security Settings -- General Settings -- FileVault -- Firewall -- MobileMe Settings -- Energy Saver Settings -- Spotlight Settings -- AirPort Preferences -- Assistive Device Access -- Software Update -- Terminal -- Summary -- Chapter 5: The Mac OS X Keychain -- How Keychains Work -- What Keychains Can Store -- Understanding Keychain Alerts -- Safari and the Keychain -- Using Keychain Access -- Summary -- Chapter 6: Working with Passwords -- Understanding Passwords -- The Varieties of Mac OS X Passwords -- Creating Good Passwords -- Using Password Assistant -- Using Third-Party Password Utilities -- Resetting an Administrator's Password -- Using a Firmware Password -- Using Smart Cards, Tokens, and Biometric Authentication Devices -- Summary -- Chapter 7: Securely Sharing System Resources -- Using Shared System Resources Wisely -- DVD or CD Sharing -- Screen Sharing -- File Sharing -- Printer Sharing -- Scanner Sharing -- Web Sharing.

Remote Login -- Remote Management -- Remote Apple Events -- Xgrid Sharing -- Internet Sharing -- Bluetooth Sharing -- Summary -- Chapter 8: Backing Up Your Mac -- Backup Basics -- Choosing Backup Software -- Using Time Machine -- Creating Bootable Duplicates -- Using Internet Backup Services -- Managing Backup Media -- RAID and Data Redundancy -- Summary -- Part II: Protecting Your Privacy -- Chapter 9: Securing Email, Chat, and Voice over IP -- Understanding Email Security -- Logging In Securely -- Using SSL for Incoming and Outgoing Mail -- Using SSL for webmail -- Digitally Signing and Encrypting Email -- Stopping Spam -- Examining Message Headers and Source -- iChat Security -- Securing Instant Messaging and Voice over IP with Third-Party Software -- Summary -- Chapter 10: Browsing the Web Securely -- The Challenges of Secure Browsing -- Using SSL Encryption -- Keeping Form Information Safe -- Protecting Yourself from Harmful Downloads -- Protecting Yourself from Phishing Schemes -- Covering Your Browsing Tracks -- Browsing Anonymously -- Blocking Ads, Pop-up Windows, and Flash -- Blocking Other Undesirable Content -- Summary -- Chapter 11: Securely Accessing Other Computers -- Transferring Files -- Controlling Another Computer Remotely -- Using SSH for Remote Login -- Summary -- Chapter 12: Using Virtual Private Networks -- What Is a Virtual Private Network? -- VPN Varieties -- Choosing a VPN Provider -- Configuring Your Mac for VPN Access -- Summary -- Chapter 13: Encrypting and Securely Deleting Files -- File-Encryption Basics -- Encrypting Individual Files and Folders -- Working with Encrypted Disk Images -- Using FileVault -- Encrypting an Entire Disk -- Using Hardware-Encrypted Drives -- Securely Deleting Files -- Securely Erasing Disks -- Recovering Deleted Files -- Summary -- Part III: Network Security Fundamentals.

Chapter 14: Guarding against Malware -- The Varieties of Malware -- Macs as Malware Carriers -- Assessing Your Mac's Vulnerability -- Common-Sense Malware Protection -- Choosing Anti-Malware Software -- Using Outbound Firewalls -- What Anti-Malware Software Can't Do -- Securing Windows on a Mac -- Summary -- Chapter 15: Securing Your Wired Network -- Understanding Gateways, Modems, and Routers -- Understanding NAT, DHCP, and IPv6 -- Using Port Forwarding -- Using a DMZ -- Using NAT-PMP or UPnP -- Using Proxy Servers -- Using 802.1X -- Summary -- Chapter 16: Securing Your Wireless Network -- Wireless Security Basics -- Configuring an AirPort Base Station -- Configuring Third-Party Access Points -- Wireless Security Settings on Your Mac -- Using Public Wi-Fi Hotspots -- Using Wi-Fi Scanning Software -- Summary -- Chapter 17: Using Firewalls -- Understanding How Firewalls Work -- Using Mac OS X's Application Firewall -- Using IPFW -- Using Other Third-Party Firewall Software -- Summary -- Chapter 18: Web Server Security -- The Basics of Running a Secure Web Server -- Using HTTP Authentication -- Securing a Site with SSL -- Avoiding Injection Attacks -- Database Security -- Summary -- Chapter 19: Using Logs -- Log Basics -- Adjusting syslogd Behavior -- Finding Logs -- Understanding the Console and System Logs -- Looking for Useful Information -- Summary -- Part IV: Advanced Security Measures -- Chapter 20: Network Scanning -- What Can Network Scanning Reveal? -- Network Mapping -- Port Scanning -- Protecting Your Macs from Network Scanning -- Summary -- Chapter 21: Vulnerability Scanning and Testing -- Using Nessus -- Using SAINT and SAINTexploit -- Using Metasploit -- Summary -- Chapter 22: Network Monitoring -- The Varieties of Network Monitoring -- Network Intrusion Detection Systems -- Network Intrusion Prevention Systems.

Information Leak Detection Systems -- Honeypot Monitoring -- Summary -- Chapter 23: Monitoring File Integrity -- Understanding File Integrity Monitoring -- Tripwire -- Radmind -- Samhain -- Baseline -- Sonar -- Summary -- Chapter 24: Forensics: Discovering What Went Wrong -- Overview of Computer Forensics -- Looking for Rogue Processes -- Looking for Rogue Software -- Using MacForensicsLab -- Other Forensics Tools -- Summary -- Part V: Securing Mac OS X Server -- Chapter 25: Mac OS X Server Security Overview -- Comparing Mac OS X and Mac OS X Server -- Mac OS X Server Security Fundamentals -- Understanding Open Directory -- Understanding Password Server and Kerberos -- Choosing Which Services to Run -- Configuring Local User Accounts -- Summary -- Chapter 26: Using Directory Services -- Configuring Open Directory -- Using Windows Directory Services -- Summary -- Chapter 27: Working with SSL Certificates -- Certificate Overview -- Creating a Self-Signed Certificate -- Requesting a Certificate from a Certificate Authority -- Creating and Using a Certificate Authority -- Managing Certificates -- Summary -- Chapter 28: Securing Email Services -- Mac OS X Mail Server Overview -- Configuring Authentication Options -- Using SSL for Email -- Configuring Relay Options -- Configuring Spam and Virus Protection -- Turning On the Mail Service -- Summary -- Chapter 29: Securing File Sharing -- About File-Sharing Protocols -- Configuring AFP -- Configuring SMB -- Configuring FTP -- Configuring NFS -- Configuring a Share Point -- Summary -- Chapter 30: Securing the Web Server -- Configuring Web Options -- Configuring Web Services -- Controlling Site Access with Realms -- Enabling SSL -- Configuring the Forward Proxy Server -- Summary -- Chapter 31: Securing Other Network Services -- Configuring the Mac OS X Server Firewall -- Using Mac OS X Server's VPN Services.

Securing Address Book Server -- Securing iCal Server -- Securing iChat Server -- Securing the Mobile Access Server -- Securing MySQL -- Securing NetBoot -- Configuring RADIUS -- Summary -- Appendix: Where to Find More Information -- Apple Publications -- Take Control ebooks -- Other Books -- Online Resources -- Index.
Abstract:
Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide. Explains the security threats to Macs, including data in transit from your e-mail or network, and malware such as viruses, worms, and Trojan horses; these threats, formerly the exclusive worry of PC users, now increasingly threaten Macs Explores physical security and hardware barriers, software settings, third-party solutions, and more Shows Mac OS X users how to develop and enforce security policies Covers security for Windows running on a Mac with Boot Camp, virtualization software such as Parallels Desktop or VMware Fusion, and more Learn the full range of options you need to consider to make your Mac safe. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: