BN.com Gift Guide

Enterprise Mac Security: Mac OS X Snow Leopard

Overview

A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.

Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the ...

See more details below
Paperback (2nd ed. 2010)
$37.50
BN.com price
(Save 16%)$44.99 List Price
Other sellers (Paperback)
  • All (16) from $2.34   
  • New (10) from $10.01   
  • Used (6) from $2.34   
Enterprise Mac Security: Mac OS X Snow Leopard

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$19.99
BN.com price
(Save 44%)$35.99 List Price

Overview

A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.

Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new Snow Leopard operating system.

Using the SANS Institute course as a sister, this book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience.

The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security.

What you’ll learn

  • The newest security techniques on Mac OS X and Snow Leopard operating system from the best and brightest
  • The details of the entire Mac OS X Snow Leopard operating system for the desktop and server, and how to secure these systems
  • Considerations for third-party applications on systems
  • The details of Mac forensics and Mac hacking
  • How to tackle Apple wireless security

Who this book is for

This book is for new users, power users, and administrators who wish to make sure that their Mac platform is secure.

Table of Contents

  1. Security Quick-Start
  2. Services, Daemons, and Processes
  3. Securing User Accounts
  4. File System Permissions
  5. Reviewing Logs and Monitoring
  6. Application Signing and Sandbox
  7. Securing Web Browsers and E-mail
  8. Malware Security: Combating Viruses, Worms, and Root Kits
  9. Encrypting Files and Volumes
  10. Securing Network Traffic
  11. Setting Up the Mac OS X Firewall
  12. Securing a Wireless Network
  13. Part IV: File Services
  14. Web Site Security
  15. Remote Connectivity
  16. Server Security
  17. Network Scanning, Intrusion Detection, and Intrusion Prevention Tools
  18. Backup and Fault Tolerance
  19. Forensics
Read More Show Less

Product Details

  • ISBN-13: 9781430227304
  • Publisher: Apress
  • Publication date: 6/7/2010
  • Edition description: 2nd ed. 2010
  • Edition number: 2
  • Pages: 648
  • Product dimensions: 7.50 (w) x 9.20 (h) x 1.40 (d)

Meet the Author

Charles Edge has been working with Apple products since he was a child. Professionally, Charles started with the Mac OS and Apple server offerings in 1999 after years working with various flavors of Unix. Charles began his consulting career working with Support Technologies and Andersen Consulting. In 2000, he found a new home at 318, Inc., a consulting firm in Santa Monica, California which is now the largest Mac consultancy in the country. At 318, Charles leads a team of over 40 engineers and has worked with network architecture, security and storage for various vertical and horizontal markets. Charles has spoken at a variety of conferences including DefCon, BlackHat, LinuxWorld, MacWorld and the WorldWide Developers Conference. Charles' first book, Mac Tiger Server Little Black Book, can be purchased through Paraglyph Press. Charles recently hung up his surfboard and moved to Minneapolis, Minnesota, with his wife, Lisa. Charles can be contacted at krypted@mac.com.

William Barker is a technical consultant at 318, Inc. in Santa Monica, California, and a freelance writer. He has a penchant for all things Web 2.0 related and is eagerly anticipating the day that he can wash his dishes and take out the trash online. His website, techiestravel.com, is a hobbie haven for two of his passions, technology and travel. He also wears a musician hat from time to time, making music: as a DJ, playing guitar, playing piano and mixing CDs for friends. He lives in Venice, California with his trusty automobile, Lucille.

Beau Hunter is a systems engineer employed at 318, Inc. in Santa Monica, California. He has been working professionally with Apple technologies since 1999, and has been supporting businesses running the Mac OS for over 8 years. Throughout this time, he has developed a name supporting and securing Apple OS X systems in multiple capacities: cross-platform systems integration, clustered web and database solutions, high-performance SANs, high-capacity backup systems, automation, and multi-OS mass deployment. Beau has also spoken at numerous events including MacWorld 2009.

A bio is not available for this author.

Ken Barker is a technical project manager/development generalist who has successfully delivered software solutions in the healthcare, state government, online retail, and tourism industries. Prior to partnering in the formation of EdgeCase, Ken helped found the Columbus Ruby Brigade, a burgeoning group of professionals who are passionate about the Ruby programming language. He began using Ruby over three years ago on the job in a wide range of applications. In addition to being passionate about Ruby, Ken is an agile software development process evangelist.

Beau Hunter is a systems engineer employed at 318, Inc. in Santa Monica, California. He has been working professionally with Apple technologies since 1999, and has been supporting businesses running the Mac OS for over 8 years. Throughout this time, he has developed a name supporting and securing Apple OS X systems in multiple capacities: cross-platform systems integration, clustered web and database solutions, high-performance SANs, high-capacity backup systems, automation, and multi-OS mass deployment. Beau has also spoken at numerous events including MacWorld 2009.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)