did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780201749694

Internet Security for Your Macintosh : A Guide for the Rest of Us

by
  • ISBN13:

    9780201749694

  • ISBN10:

    0201749696

  • Format: Paperback
  • Copyright: 2001-07-01
  • Publisher: Pearson P T R
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $19.99

Summary

Within the past few years, permanent connections to the Internet (cable modems, DSL) and peer-to-peer networking (such as Napster) have become popular with home users, but these technological advances open up your computer to security risks. While there are many books available on Internet and network security, there are currently no books available on personal Macintosh security for home users written for both Mac OS 9 and OS X. Macintosh Internet Security: A Guide to Securing your Mac on the Internet fills this void with a home user guide to the essentials of Macintosh security. From viruses and personal firewalls, to analyzing and responding to security threats, Macintosh Internet Security leads beginner and advanced Macintosh users through the basics of personal Macintosh security.

Table of Contents

Getting Started
1(4)
About This Book
3(1)
About the Authors
4(1)
PART ONE: GENERAL SECURITY PRINCIPLES 5(88)
What, Me Worry?
7(14)
More People on the Net More Often
8(1)
More People Doing More Important Things
9(1)
More and More Attacks
10(2)
Why Me?
12(2)
It Gets Worse
14(1)
Broadband Connections Are Especially Vulnerable
15(2)
But I Use a Mac!
17(2)
What, Me Worry Too Much?
19(2)
Physical Security
21(8)
Things that Can Go Wrong
22(1)
Physical Security First
23(1)
Things Will Go Wrong Anyway
24(5)
Backup options
25(3)
Good backup procedures
28(1)
Managing Passwords
29(20)
More and More Passwords
30(2)
Web-site passwords
31(1)
Passwords for other services
31(1)
Choosing Good Passwords
32(4)
Making a password hard to guess
33(2)
Making a password easy to remember
35(1)
Keeping Your Passwords Secret
36(2)
Managing Your Passwords
38(8)
Using the Keychain
38(2)
Other password-management techniques
40(5)
Dealing with forgotten passwords
45(1)
Passwords in the Future
46(3)
Digital certificates
46(1)
Other password options
47(2)
Safe Surfing
49(24)
Safe Web Browsing
50(8)
Secure and insecure Web pages
50(3)
Think before you type
53(2)
Other Web-security issues
55(3)
Safe E-mail
58(13)
Sending your e-mail password
58(3)
Sending e-mail
61(1)
Sending e-mail securely
62(2)
Receiving attachments
64(5)
Other issues with receiving e-mail
69(2)
Safety with Other Internet Applications
71(2)
Internet Basics
73(20)
Infrastructure
74(2)
Protocols
76(3)
IP Addresses and Host Names
79(5)
Static versus dynamic IP addresses
79(1)
Public versus private IP addresses
80(1)
Subnet masks
81(1)
Routers
82(1)
Host names and domain names
83(1)
The Domain Name System
83(1)
Port Numbers
84(2)
The TCP/IP Control Panel
86(7)
Configuring your Mac for cable-modem access with a dynamic IP address
86(2)
Configuring your Mac for cable-modem access with a static IP address
88(1)
Configuring your Mac for dial-up connection
89(1)
TCP/IP configurations
90(1)
Mac OS X
90(3)
PART TWO: SECURING INTERNET SERVICES 93(64)
Principles of Securing Internet Services
95(6)
Using Versus Providing Internet Services
96(1)
Levels of Security
97(1)
Apple Talk and TCP/IP
98(1)
Users & Groups
99(2)
Securing Common Mac OS Internet Services
101(18)
File Sharing
102(7)
Risk
105(1)
Security measures
106(3)
Web Sharing
109(6)
Risk
110(2)
Security measures
112(3)
Program Linking
115(4)
Risk
116(1)
Security measures
117(2)
Securing Other Mac OS Internet Services
119(14)
Remote Access
120(3)
Risk
121(1)
Security measures
122(1)
Apple Network Assistant
123(3)
Risk
124(1)
Security measures
125(1)
SNMP
126(4)
Risk
128(1)
Security measures
128(2)
Apple File Security
130(3)
Securing Third-Party Internet Services
133(24)
Timbuktu
134(6)
Risk
136(1)
Security measures
137(3)
Retrospect
140(4)
Risk
141(1)
Security measures
142(2)
FileMaker Pro
144(4)
Risk
144(1)
Security measures
145(3)
ShareWay IP
148(5)
Risk
151(1)
Security measures
152(1)
Other Applications
153(4)
Risk
154(1)
Security measures
155(2)
PART THREE: ENHANCING OVERALL SECURITY 157(90)
Viruses
159(20)
What Viruses Are
160(5)
How they work
161(1)
Where they come from
162(1)
Types of viruses
163(2)
What Viruses Can Do
165(4)
Unintentional damage
166(1)
Intentional damage
167(2)
What You Can Do About Them
169(10)
Going beyond safe surfing
169(2)
Getting an antivirus application
171(2)
Installing an antivirus application
173(2)
Using an antivirus application
175(4)
Personal Firewalls
179(36)
Firewall Basics
180(5)
Firewall types
180(1)
How firewalls work
181(3)
Stateful firewalls
184(1)
Features
185(7)
Protocols supported
186(1)
Firewall feedback
187(2)
Other kinds of attacks
189(1)
Multihoming support
190(1)
Outgoing-packet protection
191(1)
Ease-of-use features
192(1)
Configuring a Personal Firewall
192(13)
Allowing access to specific TCP/IP services
193(3)
Allowing access to all TCP/IP services
196(1)
Protecting UDP services
196(2)
Denying access to ICMP
198(1)
Logging
199(1)
Setting up notification
199(1)
Using stealth mode
200(1)
Configuring a firewall for specific services
201(2)
Downloading files
203(2)
Testing a Personal Firewall
205(4)
How to test your firewall
208(1)
Testing Mac OS 9 and Multiple Users
208(1)
Troubleshooting a Firewall
209(2)
TCP problems
209(1)
UDP problems
210(1)
ICMP problems
211(1)
Network Address Translation
211(1)
Services and Port Numbers
212(3)
Analyzing and Responding to Security Threats
215(32)
Generating Useful Data
216(2)
Log files
216(1)
Log-file format
217(1)
Real-time information
218(1)
Detecting Suspicious Activity
218(11)
Establish a baseline
218(1)
What to look for
219(3)
Real-time monitoring
222(2)
Log-file analysis tools
224(2)
Finding patterns in your firewall's log
226(3)
Is it malicious?
229(1)
Investigating and Reporting Suspicious Acitivity
229(7)
Finding network administrators
230(3)
Creating the e-mail
233(1)
If you can't contact the network administrator
234(2)
Understanding Common Access Attempts
236(6)
The Most Common Attacks: A Case Study
242(5)
PART FOUR: ADVANCED TOPICS 247(134)
Just Say No to FTP
249(18)
What Is FTP?
250(1)
Why Is FTP So Bad?
251(7)
Negative security
251(1)
How FTP decreases security
252(2)
A real-world scenario: hacking a Web site through FTP
254(1)
Things can get a lot worse
255(3)
What Can You Use in Place of FTP?
258(9)
The Macintosh alternative
258(4)
Windows alternatives
262(1)
Other alternatives
263(1)
If you must use FTP
264(3)
Home Networking
267(10)
Network Address Translation
268(4)
How NAT works
268(3)
Concerns about NAT gateways
271(1)
All-in-One Home Networking Devices
272(2)
General Security Precautions for Home Networks
274(3)
Wireless Networking
277(14)
How AirPort Works
278(2)
How AirPort Is Used
280(2)
Securing AirPort
282(9)
Too much freedom
282(2)
Multiple levels of defense
284(4)
Securing the base station
288(2)
Public access
290(1)
Internet Security at Work
291(52)
Security Goes Both Ways
292(1)
Centralizing Security
293(14)
Network-global firewalls
294(4)
Remote network access
298(1)
Dial-in remote access
299(2)
Virtual private networks
301(4)
Directory services
305(1)
Network administration
306(1)
Windows Machines
307(4)
Interacting with Windows machines
307(3)
Preventing cross-platform contamination
310(1)
Securing Macintosh Servers
311(19)
General server security
312(4)
WebSTAR security
316(4)
AppleShare IP security
320(4)
Security suites for WebSTAR and AppleShare IP
324(4)
Mac OS X Server
328(2)
Policies and Procedures
330(6)
Inside jobs
331(1)
Formal security policy
332(4)
Expect the unexpected
336(1)
Macintosh Networking in Transition
336(7)
Macintosh network security in transition
337(1)
From AppleTalk to IP
337(2)
From Mac OS 9 to Mac OS X
339(1)
Transition management
340(3)
Securing Mac OS X
343(38)
The Mac in Transition
344(2)
Mac OS X General Overview
346(3)
Unix
346(2)
Unix for the rest of us
348(1)
Mac OS X Networking Overview
349(7)
Client overview
349(4)
Services overview
353(3)
Mac OS X Internet Security
356(25)
What, me worry?
357(1)
Physical security
357(2)
Managing passwords
359(2)
Safe surfing
361(1)
Mac OS X's model for securing services
362(3)
Securing Mac OS X services
365(6)
Viruses
371(1)
Personal firewalls
371(3)
Detecting and responding to security threats
374(3)
Just say no to FTP
377(1)
Home networking
378(1)
Wireless networking
378(1)
Internet security at work
379(2)
Index 381

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program