Atjaunināt sīkdatņu piekrišanu

E-grāmata: Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level

  • Formāts: PDF+DRM
  • Izdošanas datums: 23-Dec-2022
  • Izdevniecība: APress
  • Valoda: eng
  • ISBN-13: 9781484289396
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 65,42 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 23-Dec-2022
  • Izdevniecība: APress
  • Valoda: eng
  • ISBN-13: 9781484289396
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will  show you how to create a Mac that’s made of steel and won’t buckle when attacked!

Ok, there’s no such thing as unhackable. No magic tool or silver bullet will eliminate risk in all forms. Security is an ongoing journey – not a simple action or software application. And that is exactly what you’ll learn to master—the foundational knowledge, skills, and mindset to holistically protect Macs. Regardless of whether it’s your personal iMac or a fleet of MacBook Pro’s assigned to the remote employees within your organization, you’ll be able to limit access while identifying and mitigating risk unique to your environment.

In addition to the information security best practices pertaining to protecting Apple computers, you’ll pivot to a coherent, security-focused mindset to better understand macOS-specific security. You’ll learn how it works and what tools and software are available to help. Both native and 3rd-party tool are covered. Safe guard your system’s privacy data and capitalize on effectively locking down the security of your Mac computers against known threats and newer trends that continue to evolve.

Hardening Your Macs is the perfect roadmap to stopping malicious attacks and bad actors from spying on users through cameras, microphones, and other built-in tools that could potentially be used against users and organizations alike. 

What You'll Learn

  • Grasp the mindset of attackers—how they plan and execute malicious incursions
  • Implement hardware solutions as well as software safeguards
  • Take advantage of Apple's built-in macOS security features in addition to 3rd party tools
  • Avoid attacks on your system that could compromise sensitive corporate data and personally identifiable information 

Who This Book Is For

IT admins responsible for managing Mac device security. Additionally users of Apple products that may have some experience using the platform in general but are not versed in security, as well as, those switching from Windows platforms will find useful information here. And anyone that wishes to expand their information security skills and/or develop a security-focused mindset to better protect their personal information and privacy data from the numerous and growing threats in the wild, such as malware and phishing.

Part 1: Understanding Security.
Chapter 1: Security 101.
Chapter 2:
Risky Business.
Chapter 3: A World of Hurt.
Chapter 4: The Mind Stone.-
Chapter 5: (Return of) the Mac.- Part 2: Welcome to the Rock.
Chapter 6:
Lock it Down.
Chapter 7: The Outer Limits.
Chapter 8: Inside Job.- Part 3:
The Spoon Does Not Bend - Only Yourself.
Chapter 9: Work
Smarter, Not Harder.
Chapter 10: Have a Plan and Stick to It.
Jesus Vigo, Jr. brings 25 years of experience, ranging from entry-level Help Desk to Systems Administrator, pivoting to Network Administration, with a concentration on Information Security. During this time, he has earned over thirty industry certifications all current and obtained a B.S. in CyberSecurity & Information Assurance, in addition to lending his expertise to CompTIA as a Subject Matter Expert and writing numerous online and printed publications on wide-ranging IT topics as they relate to cybersecurity and hardening endpoints to protect hardware, users, and private data. During this time, he expanded his skillset to incorporate Apple devices, including supporting macOS and iOS-based devices in a remote, 1:1 CYOD initiative, incorporating industry best practices, endpoint security configurations, and extensive scripting to achieve automating workflows to adhere to Device Lifecycle Management processes for over 60,000 Apple-based devices.