Programming Books C Java PHP Python Learn more Browse Programming Books
Foundations of Mac OS X Leopard Security and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $39.99
  • Save: $18.77 (47%)
FREE Shipping on orders over $35.
Only 2 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
FREE Shipping on orders over $35.
Used: Like New | Details
Sold by BuyAllThat
Condition: Used: Like New
Comment: Clean book with no writing, underlining or highlighting inside. Used copies may have remainder mark on edge. Promptly shipped with delivery confirmation.
Access codes and supplements are not guaranteed with used items.
Add to Cart
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals) Paperback – April 29, 2008

ISBN-13: 978-1590599891 ISBN-10: 1590599896 Edition: 1st

Buy New
Price: $21.22
42 New from $0.01 51 Used from $0.01 1 Collectible from $9.98
Amazon Price New from Used from
Kindle
"Please retry"
Paperback, April 29, 2008
$21.22
$0.01 $0.01
NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: Books for Professionals by Professionals
  • Paperback: 488 pages
  • Publisher: Apress; 1 edition (April 29, 2008)
  • Language: English
  • ISBN-10: 1590599896
  • ISBN-13: 978-1590599891
  • Product Dimensions: 9.1 x 7 x 1 inches
  • Shipping Weight: 1.6 pounds (View shipping rates and policies)
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #2,517,764 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Ken Barker is a technical project manager/development generalist who has successfully delivered software solutions in the healthcare, state government, online retail, and tourism industries. Prior to partnering in the formation of EdgeCase, Ken helped found the Columbus Ruby Brigade, a burgeoning group of professionals who are passionate about the Ruby programming language. He began using Ruby over three years ago on the job in a wide range of applications. In addition to being passionate about Ruby, Ken is an agile software development process evangelist.

Charles Edge has been working with Apple products since he was a child. Professionally, Charles started with the Mac OS and Apple server offerings in 1999 after years working with various flavors of Unix. Charles began his consulting career working with Support Technologies and Andersen Consulting. In 2000, he found a new home at 318, Inc., a consulting firm in Santa Monica, California which is now the largest Mac consultancy in the country. At 318, Charles leads a team of over 40 engineers and has worked with network architecture, security and storage for various vertical and horizontal markets. Charles has spoken at a variety of conferences including DefCon, BlackHat, LinuxWorld, MacWorld and the WorldWide Developers Conference. Charles' first book, Mac Tiger Server Little Black Book, can be purchased through Paraglyph Press. Charles recently hung up his surfboard and moved to Minneapolis, Minnesota, with his wife, Lisa. Charles can be contacted at krypted@mac.com.

More About the Author

Charles Edge has been working with Apple products since he was a child. Professionally, Charles started with the Mac OS and Apple server offerings in1999 after years working with various flavors of Unix. Charles began his consulting career working with Support Technologies and Andersen Consulting. In 2000, he found a new home at 318, a consulting firm in Santa Monica, California which is now the largest Mac consultancy in the country. At 318, Charles leads a team of over 40 engineers and has worked with network architecture, security and storage for various vertical and horizontal markets.

Charles has spoken at a variety of conferences including DefCon, BlackHat, LinuxWorld, MacWorld and the WorldWide Developers Conference. Charles' first book, Mac Tiger Server Little Black Book, can be purchased through Paraglyph Press. Charles recently hung up his surfboard and moved to Minneapolis, Minnesota, with his wife, Lisa. Charles can be contacted at krypted@mac.com

Customer Reviews

4.0 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

10 of 11 people found the following review helpful By Fred on August 2, 2008
Format: Paperback
The major problem with this book is that it is poorly edited.

Examples #1 & #2, from pages 177-178: There are two sections with the following names: "Working with Default Services in Tiger" and "Allowing Non-Apple Services in Tiger". But the book is about *Leopard*.

The index has a block of entries under the subject "Tiger" - and *no* entry for "Leopard".

Screenshots in various places are sometimes either wrong (p. 345, where a HenWen config screen is placed instead of a Kerio login screen) or from previous versions of OS X (the Bluetooth Preference panes shown are *not* from Leopard; the location of the Firewall preferences pane being in the Security preferences rather than Sharing); other times the captions for screenshots haven't been updated from the Tiger version of the book.

The firewall section refers to a feature (including screenshots of it) - UDP blocking - that no longer exists in the firewall settings pane.

The section on ACLs omits any discussion of how to view them, or how to set them.

There are one or two mentions of "Sandbox" but no discussion of what it is nor how to use it.

There is a rather ridiculous editing gaffe where the text recommends using the Unix "mkdir" command to create a *file* (this command creates folders or directories, not files).

Examples could be multiplied, but these are some of the most egregious ones.

Lastly, the style is rather tedious. It reads like an oral presentation, but written English isn't spoken English.

I don't fault the authors for any of these issues. All of these problems should have been caught and fixed during editing. But these technical problems make me a bit uneasy about trusting the information in the book.
Read more ›
3 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
15 of 18 people found the following review helpful By John A. Suda VINE VOICE on May 30, 2008
Format: Paperback
At least a half-dozen times in the book "Foundations of Mac OS X Leopard Security" the authors state that there is a misconception that the Macintosh computer is immune from security problems. That allegation may explain why there are very few books published (and nearly none in recent years) about security for the Mac. This book is meant to change all that. The authors acknowledge that the Mac OS Xsoftware has had little of the security problem experience of Windows (and other operating systems, to a lesser extent) but they spend 488 pages detailing exactly where and how the Macintosh platform is (or may be?) vulnerable.

Many of the security issues raised in the book are theoretical or deal with added elements of the Mac software install that contain non-Apple components -- Apache Web server and Perl and PHP scripting packages, for example. Many of the items of concern deal with generic problem areas of computer usage in general, both software and hardware, which affect the Mac as well as any other computers and networks. While the perspective of the book is on the Mac, much of the security review will apply to any type of computer or network.

Messieurs Edge, Barker, and Smith are seasoned Mac and security professionals who point out in a very systematic and comprehensive way the potential problems of running the Mac both in single use and networked environments. The focus is primarily on Mac OS X Leopard and the other software which comes with any new Mac computer, although there is some discussion of earlier OS X versions and earlier generations of Apple applications like Airport.

The book has five main parts covering general security matters, essential security fundamentals, networking, sharing, and workplace security issues.
Read more ›
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Leo of BORG on March 13, 2010
Format: Paperback Verified Purchase
This Apress book probably deserved a space in your shelf 12 months ago when Leopard was in wide use. I bought it at the time and STILL refer to it from time to time.

That being said, a lot of the fundamentals in the book still apply. What I recommend is get the PDF version of this book and have it on your admin machine. It's still very useful and searching the PDF that you can get from APRESS makes it worth it to have a soft copy over having this book in paper.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 13 people found the following review helpful By Cade D. Bourne on May 8, 2008
Format: Paperback
I can't overstate my satisfaction with this book. This is a wealth of information that is presented in a clear and easy to follow manner. Working in the IT industry, it is important to keep up on developments (as they occur daily). For Leopard security, this is THE BOOK to have.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images