Internet Security for Your Macintosh : A Guide for the Rest of Us

Overview

Within the past few years, permanent connections to the Internet (cable modems, DSL) have become available for home users in need of faster and more reliable Internet access. And peer-to-peer networking, made popular by the rapid growth of Napster and other file-sharing applications, is everywhere. But these technological advances also open up your computer to security risks. While there are many books available on Internet and network security, there are virtually no books on Macintosh security for home users. ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (11) from $1.99   
  • New (2) from $39.49   
  • Used (9) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$39.49
Seller since 2015

Feedback rating:

(337)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$50.00
Seller since 2015

Feedback rating:

(215)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Within the past few years, permanent connections to the Internet (cable modems, DSL) have become available for home users in need of faster and more reliable Internet access. And peer-to-peer networking, made popular by the rapid growth of Napster and other file-sharing applications, is everywhere. But these technological advances also open up your computer to security risks. While there are many books available on Internet and network security, there are virtually no books on Macintosh security for home users. Written by Alan B. Oppenheimer, co-designer of the AppleTalk network system, and Charles Whitaker, a veteran of Informix, Inc., Macintosh Internet Security is a thorough, yet approachable guide to the essential security information for any Internet-connected Macintosh.
Read More Show Less

Product Details

  • ISBN-13: 9780201749694
  • Publisher: Pearson Education
  • Publication date: 7/10/2001
  • Pages: 380
  • Product dimensions: 7.55 (w) x 9.31 (h) x 0.87 (d)

Table of Contents

Ch. 1 Getting Started 1
Pt. 1 General Security Principles 5
Ch. 2 What, Me Worry? 7
Ch. 3 Physical Security 21
Ch. 4 Managing Passwords 29
Ch. 5 Safe Surfing 49
Ch. 6 Internet Basics 73
Pt. 2 Securing Internet Services 93
Ch. 7 Principles of Securing Internet Services 95
Ch. 8 Securing Common Mac OS Internet Services 101
Ch. 9 Securing Other Mac OS Internet Services 119
Ch. 10 Securing Third-Party Internet Services 133
Pt. 3 Enhancing Overall Security 157
Ch. 11 Viruses 157
Ch. 12 Personal Firewalls 179
Ch. 13 Analyzing and Responding to Security Threats 215
Pt. 4 Advanced Topics 247
Ch. 14 Just Say No to FTP 249
Ch. 15 Home Networking 267
Ch. 16 Wireless Networking 277
Ch. 17 Internet Security at Work 291
Ch. 18 Securing Mac OS X 343
Index 381
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted August 16, 2001

    Another Must Have Macintosh Reference Guide

    Internet Security for yor Macintosh - A Guide for the Rest of Us, is, in my opinion an ESSENTIAL TEXT for every serious Mac user. There are few, if any, (good or complete) reference manuals written in this area. This book, I suggest, fills a significant gap where there are already a number of problems. As we move to broadband DSL technologies and Unix based operating systems our exposure becomes greater and our problems will, I believe, only get worse. The authors Oppenheimer and Whittaker have a very impressive background in the Mac environment. They also run a Mac specific ISP and the benefits of their estensive practical experience, clearly. in my opinion, shines through. The book is firstly an excellent primer on basic security matters which apply to all installations whether Mac or PC. These basics are covered the first of four parts - 'GENERAL SECURITY PRINCIPLES' in some 6 of the texts 18 chapters. The authors' style is elegant in its simlpicity and pragmatic showing the benefits of joint authorship. To me it is readily acceptable and should appeal and be understood by the new and intermediate user. It won't do the Advanced user any harm either! There is also an underlying current of humour to attract the interest of readers and to make the book more easily readable. This humour is judicious and effective because it is not overdone. Part 2 Is of 4 chapters covering 'SECURING INTERNET SERVICES'. Then once that is digested part 3 'ENHANCING OVERALL SECURITY' covers, inter alia, Viruses Personal Firewalls and provides 'what to do when you are attacked,' advice. Finally part 4 covers ADVANCED TOPICS' and discusses problems between home and work and specifically Mac OS X. As we consistently hear about secret? tunnels on other platforms into computers due to inadequate software the practical experience of the authors is evident when they advise us that even if we invoke a range of advanced procedures we need first to get the basics right on a - crawl before you walk, before you run basis. Publishers Peachpit Press provide a website where late breaking information can be found and where we can both give and receive relevant up to date information. If as I suspect Internet Security problems may rappidy escalate the provision of such a formal semi real time response capability may prove invaluable for all of us. This book, clearly, in my opinion, fills a significant gap in Security procedures and Internet Security in a well written and pragmatic style by two authors who clearly know what they are doing. They have,I believe, written in an acceptable and pragmatic style and achieved their objective. I have no hesitation in recommending this as an essential text to all my fellow Mac users and awarding it 5 stars RK

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)