Mac Security Bible


Joe. Kissell
Bok Engelsk 2009 · Electronic books.
Annen tittel
Utgitt
Chichester : : Wiley, , 2009.
Omfang
1 online resource (940 p.)
Opplysninger
Description based upon print version of record.. - Mac® Security Bible; Acknowledgments; Introduction; Contents at a Glance; Contents; Part I: Mac Security Basics; Chapter 1: Mac Security Overview; Mac Security: Myth versus Fact; Major Mac OS X Security Features; Privacy versus Security; Weighing Convenience against Security; Understanding Your Risks; The Theory and Practice of Best Practices; Seven Things You Should Do Right Now; Summary; Chapter 2: Securing Your Mac against Theft; Security Cables and Locks; Laptop Lockers; Other Theft Deterrents; Marking a Mac for Recovery; Tracking and Recovering Stolen Macs; Summary. - Chapter 12: Using Virtual Private Networks. - Chapter 3: Working with User AccountsHow Accounts Affect Security; Understanding POSIX Permissions; Types of Accounts; Configuring an Account; Adjusting Login Options; Using Parental Controls; Using the Sudo Command; Using Access Control Lists; Summary; Chapter 4: Configuring Basic Security Settings; General Settings; FileVault; Firewall; MobileMe Settings; Energy Saver Settings; Spotlight Settings; AirPort Preferences; Assistive Device Access; Software Update; Terminal; Summary; Chapter 5: The Mac OS X Keychain; How Keychains Work; What Keychains Can Store; Understanding Keychain Alerts. - Remote Apple EventsXgrid Sharing; Internet Sharing; Bluetooth Sharing; Summary; Chapter 8: Backing Up Your Mac; Backup Basics; Choosing Backup Software; Using Time Machine; Creating Bootable Duplicates; Using Internet Backup Services; Managing Backup Media; RAID and Data Redundancy; Summary; Part II: Protecting Your Privacy; Chapter 9: Securing Email, Chat, and Voice over IP; Understanding Email Security; Logging In Securely; Using SSL for Incoming and Outgoing Mail; Using SSL for webmail; Digitally Signing and Encrypting Email; Stopping Spam; Examining Message Headers and Source. - Safari and the KeychainUsing Keychain Access; Summary; Chapter 6: Working with Passwords; Understanding Passwords; The Varieties of Mac OS X Passwords; Creating Good Passwords; Using Password Assistant; Using Third-Party Password Utilities; Resetting an Administrator's Password; Using a Firmware Password; Using Smart Cards, Tokens, and Biometric Authentication Devices; Summary; Chapter 7: Securely Sharing System Resources; Using Shared System Resources Wisely; DVD or CD Sharing; Screen Sharing; File Sharing; Printer Sharing; Scanner Sharing; Web Sharing; Remote Login; Remote Management. - iChat SecuritySecuring Instant Messaging and Voice over IP with Third-Party Software; Summary; Chapter 10: Browsing the Web Securely; The Challenges of Secure Browsing; Using SSL Encryption; Keeping Form Information Safe; Protecting Yourself from Harmful Downloads; Protecting Yourself from Phishing Schemes; Covering Your Browsing Tracks; Browsing Anonymously; Blocking Ads, Pop-up Windows, and Flash; Blocking Other Undesirable Content; Summary; Chapter 11: Securely Accessing Other Computers; Transferring Files; Controlling Another Computer Remotely; Using SSH for Remote Login; Summary. - Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's ""25 Most Influential People"" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide.
Emner
Sjanger
Dewey
ISBN
047047419X. - 9780470474198

Bibliotek som har denne