Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Mac OS X Security Paperback – May 31 2003


See all formats and editions Hide other formats and editions
Amazon Price New from Used from
Paperback
"Please retry"
CDN$ 48.94 CDN$ 0.39

Best Books of 2014
Unruly Places is our #1 pick for 2014. See all


Hero Quick Promo
Boxing Day Kindle Deals
Load your library with over 30 popular fiction books and more, today only. Learn more

Product Details

  • Paperback: 408 pages
  • Publisher: New Riders Press; 1 edition (May 31 2003)
  • Language: English
  • ISBN-10: 0735713480
  • ISBN-13: 978-0735713482
  • Product Dimensions: 18.5 x 2.8 x 22.9 cm
  • Shipping Weight: 680 g
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Bestsellers Rank: #2,788,821 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

From the Back Cover

Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.

About the Author

Bruce Potter, Senior Software Security consultant at Cigital, Inc., is the founder of The Shmoo Group, an organization of security and cryptography professionals. He is also the founder and president of Capital Area Wireless Network, a nonprofit community wireless initiative based in Washington, DC. He has spoken at the Black Hat and DefCon conferences.

Preston Norvell is a long-standing member of the Shmoo group and the originator of MacSecurity.org, a Shmoo Group-sponsored organization specializing in Mac OS security. By day he is a Project and Security Engineer for Mercury Data Group.

Brian Wotring is an independent software engineer and founder of knowngoods.org, an online database of file signatures. He is also the author of Osiris, a host integrity management application. An active member of The Shmoo Group, Brian has authored and ported many security related applications to Mac OS X and Mac OS X Server.


Inside This Book (Learn More)
First Sentence
The most recent version of Mac OS is a multitasking, multithreated, multiuser, and multiprocessing operating system. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

5.0 out of 5 stars
5 star
2
4 star
0
3 star
0
2 star
0
1 star
0
See both customer reviews
Share your thoughts with other customers

Most helpful customer reviews

Format: Paperback
The following review was originally made for the Lower East Side Mac Unix Users Group, (lesmuug.org).
OVERVIEW
--
I was heading out soon to my first 'DefCon Experience' this summer, so when I saw this Security book with a really ugly green-trippy cover on the LESMUUG bookshelf, I was immediately interested.
I'd read loads of security materials before, some good, some completely stupid. Good security is never an absolute, any experienced locksmith or network security admin knows this, so I'm wary of any resource which states 'Do this, and your safe' (except from the author of the resource).
This book met, and exceeded my base expectations, starting out expressing this very sentiment- and constantly refers to the idea that every feature (even just booting), carries with it consequences- some having greater chances of being compromised in some way.
That stated, every nuts-and-bolts section deals with the risks involved with a given system component, and gives best-practice real world examples. Noteworthy, is that the book rarely says 'do this', as this violates basic principles security, but instead explains how your system works in the context of securing your data, gives general conceptual workarounds, and assesses their general consequences.
Clear distinctions between Mac OSX, Darwin, and Mac OSX Server are clearly defined and referenced- and the information covered definitely applies to the future with 'Panther', (though some of the locations of various resources will likely change).
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
If you're the owner of a Macintosh running OS X and security is either a concern or an interest, this book is a great reference.
It covers both the very basics in good layman's terms and identifies what is useful information to the average user, such as safely sharing a computer between many users, encrypting files, saving passwords, and how to prevent unauthorized use.
For system administrators and power users, it points out and describes the security considerations of using the more advanced features features of Mac OS X, including file sharing, NetInfo, the Apache web server, and the many networking features and protocols for which Mac OS X includes support.
In order to prevent and monitor for security incidents, the book contains a good description of monitoring an OS X system, and in the unfortunate case of such an incident happening, forensics tools are discussed as well.
In summary, "Mac OS X Security" is a comprehensive reference on the security features, functionality, and strengthening of Apple's new operating system with good information for OS X users of all levels of skill.
-Peter Bartoli
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 3 reviews
13 of 13 people found the following review helpful
a great reference for the security of everything Mac OS X June 17 2003
By Peter J Bartoli - Published on Amazon.com
Format: Paperback
If you're the owner of a Macintosh running OS X and security is either a concern or an interest, this book is a great reference.
It covers both the very basics in good layman's terms and identifies what is useful information to the average user, such as safely sharing a computer between many users, encrypting files, saving passwords, and how to prevent unauthorized use.
For system administrators and power users, it points out and describes the security considerations of using the more advanced features features of Mac OS X, including file sharing, NetInfo, the Apache web server, and the many networking features and protocols for which Mac OS X includes support.
In order to prevent and monitor for security incidents, the book contains a good description of monitoring an OS X system, and in the unfortunate case of such an incident happening, forensics tools are discussed as well.
In summary, "Mac OS X Security" is a comprehensive reference on the security features, functionality, and strengthening of Apple's new operating system with good information for OS X users of all levels of skill.
-Peter Bartoli
9 of 9 people found the following review helpful
lesmuug reviews this book Aug. 19 2003
By Isaac Levy - Published on Amazon.com
Format: Paperback
The following review was originally made for the Lower East Side Mac Unix Users Group, (lesmuug.org).
OVERVIEW
--
I was heading out soon to my first 'DefCon Experience' this summer, so when I saw this Security book with a really ugly green-trippy cover on the LESMUUG bookshelf, I was immediately interested.
I'd read loads of security materials before, some good, some completely stupid. Good security is never an absolute, any experienced locksmith or network security admin knows this, so I'm wary of any resource which states 'Do this, and your safe' (except from the author of the resource).
This book met, and exceeded my base expectations, starting out expressing this very sentiment- and constantly refers to the idea that every feature (even just booting), carries with it consequences- some having greater chances of being compromised in some way.
That stated, every nuts-and-bolts section deals with the risks involved with a given system component, and gives best-practice real world examples. Noteworthy, is that the book rarely says 'do this', as this violates basic principles security, but instead explains how your system works in the context of securing your data, gives general conceptual workarounds, and assesses their general consequences.
Clear distinctions between Mac OSX, Darwin, and Mac OSX Server are clearly defined and referenced- and the information covered definitely applies to the future with 'Panther', (though some of the locations of various resources will likely change).
BOOK SUMMARY
--
The book is divided up into sections for easy reference, but I'll summarize it all by grouping things into 3 main sections:
1) Finder: User (finder level) Application security
2) Darwin: Server and general UNIX security
3) Enterprise Security/Authentication systems built into MOSX and how-to use them
All the sections cross reference each-other nicely, (for example, secure Mail.app usage [and protecting local mail data], is totally shot if your mail server is insecure). The materials on User-level security really go deep into the way the system relies on various system frameworks, and how these frameworks are secured.
It also goes into depth on how Keychain.app works, and how to effectively use it- (as well as touching on how developers can implement it).
To me, a web application developer, the Darwin and general UNIX security section was most useful to me, as it gave the MOSX equivalents for a lot of what I do daily on freeBSD servers (and gave a deeper understanding of how thoughtfully designed Darwin is!)
Additionally, clear how-to's of almost every basic secure system is covered, (SSL, SSH, Tunneling, authentication best practice, etc...), excellent practical info for both newbies and professionals alike. (All of it made me want to do more system development and hosting on Darwin after going through this!)
The Enterprise security sections (network/security) give a great overview of both practical use, and the internals of things like NetInfo, LDAP, Kerberos, etc... giving both a general overview of these systems, and their relevance to MOSX, from both a client and server perspective. There additionally is a section on security auditing and forensics, but it's mostly a brief overview, as these topics are way too large to be covered in-depth here. Regardless, it does cover the basics and gives some valuable MOSX-specific notes for log locations. I thought this is great stuff, especially since I (and most folks) don't use this stuff every day, and things like NetInfo are so poorly documented elsewhere.
IKE SUMMARY
--
If you want absolute security for a given system, don't turn on the computer (and additionally, encase it in concrete, and hide that somewhere). However, if you want to gain a better understanding of how to reduce the likelihood of having your data compromised, this book is a terrific launchpad for the practical and/or paranoid Mac OS X user, developer, or other... heck, it's just a good book to quickly a practical view of the core of how OSX fundamentally works.
All in all, THIS BOOK ROCKS, as do the authors. Good information doesn't usually come from good writers, and this text is extremely readable.
0 of 1 people found the following review helpful
useless book too old May 9 2013
By Fabien - Published on Amazon.com
Format: Paperback Verified Purchase
don't buy useless and not worth the money, good for stating a BBQ or for under a piece of furniture.


Feedback