- Paperback: 900 pages
- Publisher: Wiley; 1 edition (January 7, 2010)
- Language: English
- ISBN-10: 047047419X
- ISBN-13: 978-0470474198
- Product Dimensions: 7.4 x 1.9 x 9.3 inches
- Shipping Weight: 3 pounds
- Average Customer Review: 34 customer reviews
- Amazon Best Sellers Rank: #1,928,474 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Mac Security Bible 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
What other items do customers buy after viewing this item?
From the Back Cover
How safe is your Mac?
Are Macs safer than PCs? Despite their bulletproof reputation, Macs are vulnerable to malware, network snooping, password cracking and, of course, physical theft (with all your data) — just like PCs. The good news is that there's a lot you can do, and this plain-English guide tells you what and how. Discover seven things you should do right now, understand the trade-offs between risk and convenience, set up your solutions, and keep your Mac safe with this practical book.
Discover what security is built into Mac OS X and how to configure it
Explore physical security, hardware barriers, software settings, and third-party solutions
Communicate safely using IM, VoIP, e-mail, and the web
Learn how to secure one or multiple Macs in wired or wireless networks
Perform network and vulnerability scanning and use forensic tools
Run Windows applications safely and securely on a Mac
Secure Mac OS X Server with Kerberos, SSL, and VPNs
About the Author
Joe Kissell was named one of MacTech's 25 most influential people in the Mac community for 2007. He's a senior contributor to Macworld and the senior editor of TidBITS, a website and weekly email newsletter about Macintosh and the Internet. Joe has worked in the Mac software industry since the early 1990s, including positions managing software development for Nisus Software and the Kensington Technology Group. He's the author of numerous books on Mac software.
Top customer reviews
This 900-page tome thoroughly covers all aspects of Mac security from keychains to Kerberos with specific examples from Mac OS X 10.5 and 10.6, but teaches security fundamentals and best practices applicable to any platform. Part one of the book (basics) should be required reading for every Mac user; more advanced users will find value in parts two and three (privacy and network fundamentals); and administrators will benefit from parts four and five (advanced security and OS X Server). The only negative this book has is that it does not cover OS X 10.7 - because it isn't out yet!
Note for Kindle users: this book does not come with bundled software, so I recommend the electronic edition just as highly. Let price and personal preference be your guides.
Perfect for an IT person or a user who needs to understand every (metaphorical) nut and bolt in his or her system, but if you are just looking for some tips on how to tighten up the basic security of your Mac, this book may end up being a bit more than you are interested in digesting.
PS - Writing reviews has become an accidental hobby for me, and it always makes my day to know that people find my reviews helpful (and if not, why.) Also, if you have any questions, clarifications, or comments please feel free to leave a comment below. I usually respond pretty quickly and almost always within 24 hours.
Things you might want to know:
1) This book is designed for IT staff (with computer science degrees) and not for the average home user. It's a very large book (900 pages) and much of its writing is quite technical and dryer than dust. I found myself falling to sleep - (over and over and OVER again) - while reading it. Also, most home users probably won't have the faintest clue as to what the author is talking about, especially when it comes to using the terminal, editing configuration files, etc.)
2) It makes a good reference book if you have a particular situation you need information about. For example, chapter 3 teaches how to work with user accounts, chapter 6 is about working with passwords, chapter 7 discusses how to securely share system resources, chapter 8 is about backups, virtual private networks (VPNs) on chapter 12, etc. Yet, if you tried to remember all of the details in this book, you'd probably come away with a massive headache and need a considerable vacation to recover from it.
3) The biggest issue that I see with this book is that the author is VERY WORDY. He obviously loves to chat, chat and chat, which means that what most authors would of written in a few paragraphs, easily turns into a 10 page adventure.
Most recent customer reviews
The majority of the book is very good.Read more