Description

Book Synopsis
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that's made of steel and won't buckle when attacked!Ok, there's no such thing as unhackable. No magic tool or silver bullet will eliminate risk in all forms. Security is an ongoing journey not a simple action or software application. And that is exactly what you'll learn to masterthe foundational knowledge, skills, and mindset to holistically protect Macs. Regardless of whether it's your personal iMac or a fleet of MacBook Pro's assigned to the remote employees within your organization, you'll be able to limit access while identifying and mitigating risk unique to your environment. In addition to the information security best practices pertaining to protecting Apple computers, you'll pivot to a coherent, security-focused mindset to better understand macOS-specificsecurity. You'll learn how it work

Table of Contents

Chapter 1: Security 101

· Introduction

· What is it?

· Why is it important?

· When is it necessary?

· Who is responsible for it?

Chapter 2: Risky Business

· Risk

· Assessments

· Matrix

· Tolerance/Appetite

Chapter 3: (Return of) the Mac

· macOS

· Hardware

· Software

· Distribution

· Frameworks (Security, Privacy, etc.)

Chapter 4: A World of Hurt

· Threat types

· Attack types

· Internal attacks

· External attacks

Chapter 6: The Mind of an Attacker

· Think like them

· Act like them

· Understand them

· Protect against them

Chapter 7: Hardware Solutions

· Startup

· Full-Disk Encryption

· Cable Lock

· Sensor Covers

· Accessories

· Licensed Cables

Chapter 8: Software Solutions

· Passwords

· Login

· User Account Types

· Multifactor Authentication

· FileVault

· System Preferences

· Screensaver

· Lock-screen

· Malware Protection

· Firewall

· VPN/ZTNA

· iCloud

· App Stores

· Secure Memory

· Transparency, Consent, and Control (TCC)

· Touch ID

· Apple Software Update

· 3rd-party Patches

· File Permissions

· Sharing Permissions

· Extensions

· Backups

· Remote Wipe

Chapter 9: Work Smarter, Not Harder

· Remote Controlling your fleet

· Mobile Device Management

· Device Configuration

· App Deployment

· Securing Devices

· Automating Workflows

· Zero Touch

Chapter 10: Make a Plan and Stick to It

· Standardize your environment

· Develop workflows to address common issues

· Automate whenever possible

· Stay on top of the latest security threats

· Train users (or your friends) to recognize threats

· Align with enterprise security frameworks

· Comply with regulatory requirements


Audience: Advanced

Hardening Your Macs

Product form

£41.24

Includes FREE delivery

RRP £54.99 – you save £13.75 (25%)

Order before 4pm today for delivery by Wed 17 Dec 2025.

A Paperback / softback by Jesus Vigo, Jr.

1 in stock


    View other formats and editions of Hardening Your Macs by Jesus Vigo, Jr.

    Publisher: APress
    Publication Date: 24/12/2022
    ISBN13: 9781484289389, 978-1484289389
    ISBN10: 1484289382

    Description

    Book Synopsis
    Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that's made of steel and won't buckle when attacked!Ok, there's no such thing as unhackable. No magic tool or silver bullet will eliminate risk in all forms. Security is an ongoing journey not a simple action or software application. And that is exactly what you'll learn to masterthe foundational knowledge, skills, and mindset to holistically protect Macs. Regardless of whether it's your personal iMac or a fleet of MacBook Pro's assigned to the remote employees within your organization, you'll be able to limit access while identifying and mitigating risk unique to your environment. In addition to the information security best practices pertaining to protecting Apple computers, you'll pivot to a coherent, security-focused mindset to better understand macOS-specificsecurity. You'll learn how it work

    Table of Contents

    Chapter 1: Security 101

    · Introduction

    · What is it?

    · Why is it important?

    · When is it necessary?

    · Who is responsible for it?

    Chapter 2: Risky Business

    · Risk

    · Assessments

    · Matrix

    · Tolerance/Appetite

    Chapter 3: (Return of) the Mac

    · macOS

    · Hardware

    · Software

    · Distribution

    · Frameworks (Security, Privacy, etc.)

    Chapter 4: A World of Hurt

    · Threat types

    · Attack types

    · Internal attacks

    · External attacks

    Chapter 6: The Mind of an Attacker

    · Think like them

    · Act like them

    · Understand them

    · Protect against them

    Chapter 7: Hardware Solutions

    · Startup

    · Full-Disk Encryption

    · Cable Lock

    · Sensor Covers

    · Accessories

    · Licensed Cables

    Chapter 8: Software Solutions

    · Passwords

    · Login

    · User Account Types

    · Multifactor Authentication

    · FileVault

    · System Preferences

    · Screensaver

    · Lock-screen

    · Malware Protection

    · Firewall

    · VPN/ZTNA

    · iCloud

    · App Stores

    · Secure Memory

    · Transparency, Consent, and Control (TCC)

    · Touch ID

    · Apple Software Update

    · 3rd-party Patches

    · File Permissions

    · Sharing Permissions

    · Extensions

    · Backups

    · Remote Wipe

    Chapter 9: Work Smarter, Not Harder

    · Remote Controlling your fleet

    · Mobile Device Management

    · Device Configuration

    · App Deployment

    · Securing Devices

    · Automating Workflows

    · Zero Touch

    Chapter 10: Make a Plan and Stick to It

    · Standardize your environment

    · Develop workflows to address common issues

    · Automate whenever possible

    · Stay on top of the latest security threats

    · Train users (or your friends) to recognize threats

    · Align with enterprise security frameworks

    · Comply with regulatory requirements


    Audience: Advanced

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account