Enterprise Mac Security: Mac OS X Snow Leopard

2nd Edition

By Charles Edge , William Barker , Beau Hunter , Gene Sullivan

Enterprise Mac Security: Mac OS X Snow Leopard Cover Image

A definitive, expert-driven update of the popular, slash-dotted first edition, containing detailed Mac OS X security information and walkthroughs on securing systems, including the Snow Leopard operating system.

Full Description

  • ISBN13: 978-1-4302-2730-4
  • User Level: Beginner to Intermediate
  • Publication Date: June 6, 2010
  • Available eBook Formats: EPUB, MOBI, PDF
  • Print Book Price: $44.99
  • eBook Price: $31.99
Buy eBook Buy Print Book Add to Wishlist

Related Titles

Full Description

A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.

Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new Snow Leopard operating system.

Using the SANS Institute course as a sister, this book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience.

The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security.

What you’ll learn

  • The newest security techniques on Mac OS X and Snow Leopard operating system from the best and brightest
  • The details of the entire Mac OS X Snow Leopard operating system for the desktop and server, and how to secure these systems
  • Considerations for third-party applications on systems
  • The details of Mac forensics and Mac hacking
  • How to tackle Apple wireless security

Who this book is for

This book is for new users, power users, and administrators who wish to make sure that their Mac platform is secure.

Table of Contents

Table of Contents

  1. Security Quick-Start
  2. Services, Daemons, and Processes  
  3. Securing User Accounts  
  4. File System Permissions  
  5. Reviewing Logs and Monitoring 
  6. Application Signing and Sandbox  
  7. Securing Web Browsers and E-mail 
  8. Malware Security: Combating Viruses, Worms, and Root Kits  
  9. Encrypting Files and Volumes 
  10. Securing Network Traffic  
  11. Setting Up the Mac OS X Firewall 
  12. Securing a Wireless Network 
  13. Part IV: File Services  
  14. Web Site Security  
  15. Remote Connectivity  
  16. Server Security  
  17. Network Scanning, Intrusion Detection, and Intrusion Prevention Tools  
  18. Backup and Fault Tolerance 
  19. Forensics

If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.

* Required Fields

No errata are currently published