• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level

ISBN-13: 9781484289389 / Angielski / Miękka / 2022 / 222 str.

Jesus Vigo Jr
Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level Jesus Vig 9781484289389 Apress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level

ISBN-13: 9781484289389 / Angielski / Miękka / 2022 / 222 str.

Jesus Vigo Jr
cena 242,07 zł
(netto: 230,54 VAT:  5%)

Najniższa cena z 30 dni: 231,29 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will  show you how to create a Mac that’s made of steel and won’t buckle when attacked!Ok, there’s no such thing as unhackable. No magic tool or silver bullet will eliminate risk in all forms. Security is an ongoing journey – not a simple action or software application. And that is exactly what you’ll learn to master—the foundational knowledge, skills, and mindset to holistically protect Macs. Regardless of whether it’s your personal iMac or a fleet of MacBook Pro’s assigned to the remote employees within your organization, you’ll be able to limit access while identifying and mitigating risk unique to your environment.In addition to the information security best practices pertaining to protecting Apple computers, you’ll pivot to a coherent, security-focused mindset to better understand macOS-specific security. You’ll learn how it works and what tools and software are available to help. Both native and 3rd-party tool are covered. Safe guard your system’s privacy data and capitalize on effectively locking down the security of your Mac computers against known threats and newer trends that continue to evolve.Hardening Your Macsis the perfect roadmap to stopping malicious attacks and bad actors from spying on users through cameras, microphones, and other built-in tools that could potentially be used against users and organizations alike.What You'll LearnGrasp the mindset of attackers—how they plan and execute malicious incursionsImplement hardware solutions as well as software safeguardsTake advantage of Apple's built-in macOS security features in addition to 3rd party toolsAvoid attacks on your system that could compromise sensitive corporate data and personally identifiable informationWho This Book Is ForIT admins responsible for managing Mac device security. Additionally users of Apple products that may have some experience using the platform in general but are not versed in security, as well as, those switching from Windows platforms will find useful information here. And anyone that wishes to expand their information security skills and/or develop a security-focused mindset to better protect their personal information and privacy data from the numerous and growing threats in the wild, such as malware and phishing.

Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will  show you how to create a Mac that’s made of steel and won’t buckle when attacked!


Ok, there’s no such thing as unhackable. No magic tool or silver bullet will eliminate risk in all forms. Security is an ongoing journey – not a simple action or software application. And that is exactly what you’ll learn to master—the foundational knowledge, skills, and mindset to holistically protect Macs. Regardless of whether it’s your personal iMac or a fleet of MacBook Pro’s assigned to the remote employees within your organization, you’ll be able to limit access while identifying and mitigating risk unique to your environment.

In addition to the information security best practices pertaining to protecting Apple computers, you’ll pivot to a coherent, security-focused mindset to better understand macOS-specific security. You’ll learn how it works and what tools and software are available to help. Both native and 3rd-party tool are covered. Safe guard your system’s privacy data and capitalize on effectively locking down the security of your Mac computers against known threats and newer trends that continue to evolve.

Hardening Your Macs is the perfect roadmap to stopping malicious attacks and bad actors from spying on users through cameras, microphones, and other built-in tools that could potentially be used against users and organizations alike. 
What You'll Learn
  • Grasp the mindset of attackers—how they plan and execute malicious incursions
  • Implement hardware solutions as well as software safeguards
  • Take advantage of Apple's built-in macOS security features in addition to 3rd party tools
  • Avoid attacks on your system that could compromise sensitive corporate data and personally identifiable information 
Who This Book Is ForIT admins responsible for managing Mac device security. Additionally users of Apple products that may have some experience using the platform in general but are not versed in security, as well as, those switching from Windows platforms will find useful information here. And anyone that wishes to expand their information security skills and/or develop a security-focused mindset to better protect their personal information and privacy data from the numerous and growing threats in the wild, such as malware and phishing.

Kategorie:
Informatyka
Kategorie BISAC:
Computers > Programming - Macintosh
Computers > Operating Systems - Mac OS
Wydawca:
Apress
Język:
Angielski
ISBN-13:
9781484289389
Rok wydania:
2022
Dostępne języki:
Ilość stron:
222
Waga:
0.34 kg
Wymiary:
23.39 x 15.6 x 1.3
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Chapter 1: Security 101

·      Introduction

·      What is it?

·      Why is it important?

·      When is it necessary?

·      Who is responsible for it?

 

Chapter 2: Risky Business

·      Risk

·      Assessments

·      Matrix

·      Tolerance/Appetite

 

Chapter 3: (Return of) the Mac

·      macOS

·      Hardware

·      Software

·      Distribution

·      Frameworks (Security, Privacy, etc.)

 

Chapter 4: A World of Hurt

·      Threat types

·      Attack types

·      Internal attacks

·      External attacks

Chapter 6: The Mind of an Attacker

·      Think like them

·      Act like them

·      Understand them

·      Protect against them

Chapter 7: Hardware Solutions

·      Startup

·      Full-Disk Encryption

·      Cable Lock

·      Sensor Covers

·      Accessories

·      Licensed Cables

Chapter 8: Software Solutions

·      Passwords

·      Login

·      User Account Types

·      Multifactor Authentication

·      FileVault

·      System Preferences

·      Screensaver

·      Lock-screen

·      Malware Protection

·      Firewall

·      VPN/ZTNA

·      iCloud

·      App Stores

·      Secure Memory

·      Transparency, Consent, and Control (TCC)

·      Touch ID

·      Apple Software Update

·      3rd-party Patches

·      File Permissions

·      Sharing Permissions

·      Extensions

·      Backups

·      Remote Wipe

Chapter 9: Work Smarter, Not Harder

·      Remote Controlling your fleet

·      Mobile Device Management

·      Device Configuration

·      App Deployment

·      Securing Devices

·      Automating Workflows

·      Zero Touch

Chapter 10: Make a Plan and Stick to It

·      Standardize your environment

·      Develop workflows to address common issues

·      Automate whenever possible

·      Stay on top of the latest security threats

·      Train users (or your friends) to recognize threats

·      Align with enterprise security frameworks

·      Comply with regulatory requirements


Audience: Advanced

Jesus Vigo, Jr. brings 25 years of experience, ranging from entry-level Help Desk to Systems Administrator, pivoting to Network Administration, with a concentration on Information Security. During this time, he has earned over thirty industry certifications – all current – and obtained a B.S. in CyberSecurity & Information Assurance, in addition to lending his expertise to CompTIA as a Subject Matter Expert and writing numerous online and printed publications on wide-ranging IT topics as they relate to cybersecurity and hardening endpoints to protect hardware, users, and private data. During this time, he expanded his skillset to incorporate Apple devices, including supporting macOS and iOS-based devices in a remote, 1:1 CYOD initiative, incorporating industry best practices, endpoint security configurations, and extensive scripting to achieve automating workflows to adhere to Device Lifecycle Management processes for over 60,000 Apple-based devices.

Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will  show you how to create a Mac that’s made of steel and won’t buckle when attacked!


Ok, there’s no such thing as unhackable. No magic tool or silver bullet will eliminate risk in all forms. Security is an ongoing journey – not a simple action or software application. And that is exactly what you’ll learn to master—the foundational knowledge, skills, and mindset to holistically protect Macs. Regardless of whether it’s your personal iMac or a fleet of MacBook Pro’s assigned to the remote employees within your organization, you’ll be able to limit access while identifying and mitigating risk unique to your environment.

In addition to the information security best practices pertaining to protecting Apple computers, you’ll pivot to a coherent, security-focused mindset to better understand macOS-specific security. You’ll learn how it works and what tools and software are available to help. Both native and 3rd-party tool are covered. Safe guard your system’s privacy data and capitalize on effectively locking down the security of your Mac computers against known threats and newer trends that continue to evolve.

Hardening Your Macs is the perfect roadmap to stopping malicious attacks and bad actors from spying on users through cameras, microphones, and other built-in tools that could potentially be used against users and organizations alike. 




Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia