Thursday, September 19, 2019

Enterprise Mac Security: El Capitan (3rd Edition)

File Size: 8.24 Mb

A common misconception in the Mac community is that the Mac is more secure than any other operating system on the market. Although this might be true in most side-by-side analyses of security features right out of the box, what this isn’t taking into account is that security tends to get overlooked once the machine starts to be configured for its true purposes. For example, when sharing is enabled or remote control applications are installed, a variety of security threats are often established—no matter what the platform is.

In the security sector, the principle of least privilege is a philosophy that security professionals abide by when determining security policies. This principle states that if you want to be secure, you need to give every component of your network the absolute minimum permissions required to do its job. But what are those permissions? What are the factors that need to be determined when making that decision? No two networks are the same; therefore, it’s certainly not a decision that can be made for you. It’s something you will need to decide for yourself based on what kinds of policies are implemented to deal with information technology security.

About the Authors
About the Technical Reviewer
Part I: The Big Picture
Chapter 1: Security Quick-Start
Chapter 2: Services, Daemons, and Processes
Chapter 3: Securing User Accounts
Chapter 4: File System Permissions
Chapter 5: Reviewing Logs and Monitoring
Part II: Securing the Ecosystem
Chapter 6: Application Signing and Sandbox
Chapter 7: Securing Web Browsers and E-mail
Chapter 8: Malware Security: Combating Viruses, Worms, and Root Kits
Chapter 9: Encrypting Files and Volumes
Part III: Securing the Network
Chapter 10: Securing Network Traffic
Chapter 11: Managing the Firewall
Chapter 12: Securing a Wireless Network
Part IV: Securely Sharing Resources
Chapter 13: File Services
Chapter 14: iCloud Security
Chapter 15: Remote Connectivity
Chapter 16: Server Security
Part V: Securing the Workplace
Chapter 17: Network Scanning, Intrusion Detection, and Intrusion Prevention Tools
Chapter 18: Backup and Fault Tolerance
Appendix A: InfoSec Acceptable Use Policy
Appendix B: CDSA
Appendix C: Introduction to Cryptography

Author Details
"Charles Edge"

"Daniel O’Donnell"

Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment