Mac Security Bible

  • ISBN13:


  • ISBN10:


  • Edition: 1st
  • Format: eBook
  • Copyright: 2011-11-02
  • Publisher: Wiley

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99 Save up to $14.00
  • Rent Book $44.99
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


Your essential, no-holds-barred guide to Mac security threats and solutions

Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide.

  • Explains the security threats to Macs, including data in transit from your e-mail or network, and malware such as viruses, worms, and Trojan horses; these threats, formerly the exclusive worry of PC users, now increasingly threaten Macs
  • Explores physical security and hardware barriers, software settings, third-party solutions, and more
  • Shows Mac OS X users how to develop and enforce security policies
  • Covers security for Windows running on a Mac with Boot Camp, virtualization software such as Parallels Desktop or VMware Fusion, and more

Learn the full range of options you need to consider to make your Mac safe.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Author Biography

Joe Kissell was named one of MacTech's 25 most influential people in the Mac community for 2007. He's a senior contributor to Macworld and the senior editor of TidBITS, a website and weekly email newsletter about Macintosh and the Internet. Joe has worked in the Mac software industry since the early 1990s, including positions managing software development for Nisus Software and the Kensington Technology Group. He's the author of numerous books on Mac software.

Table of Contents



Part I: Mac Security Basics.

Chapter 1: Mac Security Overview.

Chapter 2: Securing Your Mac against Theft.

Chapter 3: Working with User Accounts.

Chapter 4: Configuring Basic Security Settings.

Chapter 5: The Mac OS X Keychain.

Chapter 6: Working with Passwords.

Chapter 7: Securely Sharing System Resources.

Chapter 8: Backing Up Your Mac.

Part II: Protecting Your Privacy.

Chapter 9: Securing Email, Chat, and Voice over IP.

Chapter 10: Browsing the Web Securely.

Chapter 11: Securely Accessing Other Computers.

Chapter 12: Using Virtual Private Networks.

Chapter 13: Encrypting and Securely Deleting Files.

Part III: Network Security Fundamentals.

Chapter 14: Guarding against Malware.

Chapter 15: Securing Your Wired Network.

Chapter 16: Securing Your Wireless Network.

Chapter 17: Using Firewalls.

Chapter 18: Web Server Security.

Chapter 19: Using Logs.

Part IV: Advanced Security Measures.

Chapter 20: Network Scanning.

Chapter 21: Vulnerability Scanning and Testing.

Chapter 22: Network Monitoring.

Chapter 23: Monitoring File Integrity.

Chapter 24: Forensics: Discovering What Went Wrong.

Part V: Securing Mac OS X Server.

Chapter 25: Mac OS X Server Security Overview.

Chapter 26: Using Directory Services.

Chapter 27: Working with SSL Certificates.

Chapter 28: Securing Email Services.

Chapter 29: Securing File Sharing.

Chapter 30: Securing the Web Server.

Chapter 31: Securing Other Network Services.


Appendix: Where to Find More Information.


Rewards Program

Write a Review