Synopses & Reviews
Your essential, no-holds-barred guide to Mac security threats and solutions
Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide.
- Explains the security threats to Macs, including data in transit from your e-mail or network, and malware such as viruses, worms, and Trojan horses; these threats, formerly the exclusive worry of PC users, now increasingly threaten Macs
- Explores physical security and hardware barriers, software settings, third-party solutions, and more
- Shows Mac OS X users how to develop and enforce security policies
- Covers security for Windows running on a Mac with Boot Camp, virtualization software such as Parallels Desktop or VMware Fusion, and more
Learn the full range of options you need to consider to make your Mac safe.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Conventional wisdom says that Macs are inherently safer than PCs, but that's largely a myth. Like all computers, Macs are susceptible to theft, network snooping, unauthorized access, malware, and other dangers that put users' sensitive data, and their privacy, at risk. The Mac Security Bible describes in detail the potential threats a Mac may face--and the tools and procedures readers can use to overcome them. Rather than prescribing a simplistic approach that says lock everything down all the time, this book helps readers understand exactly what risks each potential threat carries, how the various possible remedies balance security against convenience and usability, and how to take the best approach for any given user and situation. The book is written in an engaging, accessible style, with enough background information to make the information comprehensible to less-technical readers--and enough deep detail to satisfy system administrators and other power users. From physical security and basic system preferences to complex third-party software, from individual computers to large networks, the Mac Security Bible is the comprehensive reference on security for Macs.
How safe is your Mac?
Are Macs safer than PCs? Despite their bulletproof reputation, Macs are vulnerable to malware, network snooping, password cracking and, of course, physical theft (with all your data) — just like PCs. The good news is that there's a lot you can do, and this plain-English guide tells you what and how. Discover seven things you should do right now, understand the trade-offs between risk and convenience, set up your solutions, and keep your Mac safe with this practical book.
Discover what security is built into Mac OS X and how to configure it
Explore physical security, hardware barriers, software settings, and third-party solutions
Communicate safely using IM, VoIP, e-mail, and the web
Learn how to secure one or multiple Macs in wired or wireless networks
Perform network and vulnerability scanning and use forensic tools
Run Windows applications safely and securely on a Mac
Secure Mac OS X Server with Kerberos, SSL, and VPNs
About the Author
Joe Kissell was named one of MacTech's 25 most influential people in the Mac community for 2007. He's a senior contributor to Macworld and the senior editor of TidBITS, a website and weekly email newsletter about Macintosh and the Internet. Joe has worked in the Mac software industry since the early 1990s, including positions managing software development for Nisus Software and the Kensington Technology Group. He's the author of numerous books on Mac software.
Table of Contents
Part I: Mac Security Basics.
Chapter 1: Mac Security Overview.
Chapter 2: Securing Your Mac against Theft.
Chapter 3: Working with User Accounts.
Chapter 4: Configuring Basic Security Settings.
Chapter 5: The Mac OS X Keychain.
Chapter 6: Working with Passwords.
Chapter 7: Securely Sharing System Resources.
Chapter 8: Backing Up Your Mac.
Part II: Protecting Your Privacy.
Chapter 9: Securing Email, Chat, and Voice over IP.
Chapter 10: Browsing the Web Securely.
Chapter 11: Securely Accessing Other Computers.
Chapter 12: Using Virtual Private Networks.
Chapter 13: Encrypting and Securely Deleting Files.
Part III: Network Security Fundamentals.
Chapter 14: Guarding against Malware.
Chapter 15: Securing Your Wired Network.
Chapter 16: Securing Your Wireless Network.
Chapter 17: Using Firewalls.
Chapter 18: Web Server Security.
Chapter 19: Using Logs.
Part IV: Advanced Security Measures.
Chapter 20: Network Scanning.
Chapter 21: Vulnerability Scanning and Testing.
Chapter 22: Network Monitoring.
Chapter 23: Monitoring File Integrity.
Chapter 24: Forensics: Discovering What Went Wrong.
Part V: Securing Mac OS X Server.
Chapter 25: Mac OS X Server Security Overview.
Chapter 26: Using Directory Services.
Chapter 27: Working with SSL Certificates.
Chapter 28: Securing Email Services.
Chapter 29: Securing File Sharing.
Chapter 30: Securing the Web Server.
Chapter 31: Securing Other Network Services.
Appendix: Where to Find More Information.