Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals) 1st Edition

4.0 out of 5 stars 4 customer reviews
ISBN-13: 978-1590599891
ISBN-10: 1590599896
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used
$5.40
Condition: Used: Very Good
Comment: publisher overstock US Standard shipping takes 4-14 business days. Expedited takes 3-6 business days. Tracking available for orders $10.00 and up. Int'l orders can take 21-42 business days for delivery. US Standard shipping takes 4-14 business days. Expedited takes 3-6 business days. Tracking available for orders $10.00 and up. Int'l orders can take 21-42 business days for delivery.
Access codes and supplements are not guaranteed with used items.
28 Used from $0.01
FREE Shipping on orders over $25.
More Buying Choices
28 New from $0.01 28 Used from $0.01

Best Books of the Year So Far
Looking for something great to read? Browse our editors' picks for the Best Books of the Year So Far in fiction, nonfiction, mysteries, children's books, and much more.
click to open popover

Editorial Reviews

About the Author

Ken Barker is a technical project manager/development generalist who has successfully delivered software solutions in the healthcare, state government, online retail, and tourism industries. Prior to partnering in the formation of EdgeCase, Ken helped found the Columbus Ruby Brigade, a burgeoning group of professionals who are passionate about the Ruby programming language. He began using Ruby over three years ago on the job in a wide range of applications. In addition to being passionate about Ruby, Ken is an agile software development process evangelist.

Charles Edge has been working with Apple products since he was a child. Professionally, Charles started with the Mac OS and Apple server offerings in 1999 after years working with various flavors of Unix. Charles began his consulting career working with Support Technologies and Andersen Consulting. In 2000, he found a new home at 318, Inc., a consulting firm in Santa Monica, California which is now the largest Mac consultancy in the country. At 318, Charles leads a team of over 40 engineers and has worked with network architecture, security and storage for various vertical and horizontal markets. Charles has spoken at a variety of conferences including DefCon, BlackHat, LinuxWorld, MacWorld and the WorldWide Developers Conference. Charles' first book, Mac Tiger Server Little Black Book, can be purchased through Paraglyph Press. Charles recently hung up his surfboard and moved to Minneapolis, Minnesota, with his wife, Lisa. Charles can be contacted at krypted@mac.com.
NO_CONTENT_IN_FEATURE

New York Times best sellers
Browse the New York Times best sellers in popular categories like Fiction, Nonfiction, Picture Books and more. See more

Product Details

  • Series: Books for Professionals by Professionals
  • Paperback: 488 pages
  • Publisher: Apress; 1 edition (April 29, 2008)
  • Language: English
  • ISBN-10: 1590599896
  • ISBN-13: 978-1590599891
  • Product Dimensions: 7 x 1.1 x 9.2 inches
  • Shipping Weight: 1.6 pounds
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #3,746,709 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

Format: Paperback
The major problem with this book is that it is poorly edited.

Examples #1 & #2, from pages 177-178: There are two sections with the following names: "Working with Default Services in Tiger" and "Allowing Non-Apple Services in Tiger". But the book is about *Leopard*.

The index has a block of entries under the subject "Tiger" - and *no* entry for "Leopard".

Screenshots in various places are sometimes either wrong (p. 345, where a HenWen config screen is placed instead of a Kerio login screen) or from previous versions of OS X (the Bluetooth Preference panes shown are *not* from Leopard; the location of the Firewall preferences pane being in the Security preferences rather than Sharing); other times the captions for screenshots haven't been updated from the Tiger version of the book.

The firewall section refers to a feature (including screenshots of it) - UDP blocking - that no longer exists in the firewall settings pane.

The section on ACLs omits any discussion of how to view them, or how to set them.

There are one or two mentions of "Sandbox" but no discussion of what it is nor how to use it.

There is a rather ridiculous editing gaffe where the text recommends using the Unix "mkdir" command to create a *file* (this command creates folders or directories, not files).

Examples could be multiplied, but these are some of the most egregious ones.

Lastly, the style is rather tedious. It reads like an oral presentation, but written English isn't spoken English.

I don't fault the authors for any of these issues. All of these problems should have been caught and fixed during editing. But these technical problems make me a bit uneasy about trusting the information in the book.
Read more ›
3 Comments 10 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
At least a half-dozen times in the book "Foundations of Mac OS X Leopard Security" the authors state that there is a misconception that the Macintosh computer is immune from security problems. That allegation may explain why there are very few books published (and nearly none in recent years) about security for the Mac. This book is meant to change all that. The authors acknowledge that the Mac OS Xsoftware has had little of the security problem experience of Windows (and other operating systems, to a lesser extent) but they spend 488 pages detailing exactly where and how the Macintosh platform is (or may be?) vulnerable.

Many of the security issues raised in the book are theoretical or deal with added elements of the Mac software install that contain non-Apple components -- Apache Web server and Perl and PHP scripting packages, for example. Many of the items of concern deal with generic problem areas of computer usage in general, both software and hardware, which affect the Mac as well as any other computers and networks. While the perspective of the book is on the Mac, much of the security review will apply to any type of computer or network.

Messieurs Edge, Barker, and Smith are seasoned Mac and security professionals who point out in a very systematic and comprehensive way the potential problems of running the Mac both in single use and networked environments. The focus is primarily on Mac OS X Leopard and the other software which comes with any new Mac computer, although there is some discussion of earlier OS X versions and earlier generations of Apple applications like Airport.

The book has five main parts covering general security matters, essential security fundamentals, networking, sharing, and workplace security issues.
Read more ›
1 Comment 15 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
I can't overstate my satisfaction with this book. This is a wealth of information that is presented in a clear and easy to follow manner. Working in the IT industry, it is important to keep up on developments (as they occur daily). For Leopard security, this is THE BOOK to have.
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
This Apress book probably deserved a space in your shelf 12 months ago when Leopard was in wide use. I bought it at the time and STILL refer to it from time to time.

That being said, a lot of the fundamentals in the book still apply. What I recommend is get the PDF version of this book and have it on your admin machine. It's still very useful and searching the PDF that you can get from APRESS makes it worth it to have a soft copy over having this book in paper.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Pages with Related Products. See and discover other items: computer programs