Mac Security Bible
Mac Security Bible
DescriptionYour essential, no-holds-barred guide to Mac security threats and solutions
Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's ""25 Most Influential People"" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide.
- Explains the security threats to Macs, including data in transit from your e-mail or network, and malware such as viruses, worms, and Trojan horses; these threats, formerly the exclusive worry of PC users, now increasingly threaten Macs
- Explores physical security and hardware barriers, software settings, third-party solutions, and more
- Shows Mac OS X users how to develop and enforce security policies
- Covers security for Windows running on a Mac with Boot Camp, virtualization software such as Parallels Desktop or VMware Fusion, and more
Learn the full range of options you need to consider to make your Mac safe.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Part I: Mac Security Basics.
Chapter 1: Mac Security Overview.
Chapter 2: Securing Your Mac against Theft.
Chapter 3: Working with User Accounts.
Chapter 4: Configuring Basic Security Settings.
Chapter 5: The Mac OS X Keychain.
Chapter 6: Working with Passwords.
Chapter 7: Securely Sharing System Resources.
Chapter 8: Backing Up Your Mac.
Part II: Protecting Your Privacy.
Chapter 9: Securing Email, Chat, and Voice over IP.
Chapter 10: Browsing the Web Securely.
Chapter 11: Securely Accessing Other Computers.
Chapter 12: Using Virtual Private Networks.
Chapter 13: Encrypting and Securely Deleting Files.
Part III: Network Security Fundamentals.
Chapter 14: Guarding against Malware.
Chapter 15: Securing Your Wired Network.
Chapter 16: Securing Your Wireless Network.
Chapter 17: Using Firewalls.
Chapter 18: Web Server Security.
Chapter 19: Using Logs.
Part IV: Advanced Security Measures.
Chapter 20: Network Scanning.
Chapter 21: Vulnerability Scanning and Testing.
Chapter 22: Network Monitoring.
Chapter 23: Monitoring File Integrity.
Chapter 24: Forensics: Discovering What Went Wrong.
Part V: Securing Mac OS X Server.
Chapter 25: Mac OS X Server Security Overview.
Chapter 26: Using Directory Services.
Chapter 27: Working with SSL Certificates.
Chapter 28: Securing Email Services.
Chapter 29: Securing File Sharing.
Chapter 30: Securing the Web Server.
Chapter 31: Securing Other Network Services.
Appendix: Where to Find More Information.