Muutke küpsiste eelistusi

E-raamat: Mac Security Bible [Wiley Online]

  • Formaat: 936 pages, Illustrations, Contains 1 Digital online
  • Sari: Bible
  • Ilmumisaeg: 12-Jan-2010
  • Kirjastus: John Wiley & Sons Ltd
  • ISBN-10: 1118257731
  • ISBN-13: 9781118257739
Teised raamatud teemal:
  • Wiley Online
  • Hind: 52,85 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 936 pages, Illustrations, Contains 1 Digital online
  • Sari: Bible
  • Ilmumisaeg: 12-Jan-2010
  • Kirjastus: John Wiley & Sons Ltd
  • ISBN-10: 1118257731
  • ISBN-13: 9781118257739
Teised raamatud teemal:
Provides information on security threats and solutions of Macs, covering such topics as basic security settings, encrypting and deleting files, securing email, using firewalls, guarding against malware, and network monitoring.

Your essential, no-holds-barred guide to Mac security threats and solutions

Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide.

  • Explains the security threats to Macs, including data in transit from your e-mail or network, and malware such as viruses, worms, and Trojan horses; these threats, formerly the exclusive worry of PC users, now increasingly threaten Macs
  • Explores physical security and hardware barriers, software settings, third-party solutions, and more
  • Shows Mac OS X users how to develop and enforce security policies
  • Covers security for Windows running on a Mac with Boot Camp, virtualization software such as Parallels Desktop or VMware Fusion, and more

Learn the full range of options you need to consider to make your Mac safe.

Part I: Mac Security Basics
1(256)
Mac Security Overview
3(24)
Mac Security: Myth versus Fact
3(4)
Is it true that Macs don't get viruses?
4(1)
Can Macs spread viruses to Windows computers?
5(1)
Is web browsing safe on a Mac?
5(1)
Can someone eavesdrop on my network if I use a Mac?
6(1)
Are Mac servers more secure than Windows servers?
6(1)
What's the biggest threat to Mac security?
7(1)
Major Mac OS X Security Features
7(3)
Open-source infrastructure
8(1)
Access permissions
8(1)
Keychain
8(1)
Firewalls
8(1)
Encrypted disk images
8(1)
File Vault
9(1)
VPN client
9(1)
Firmware password protection
9(1)
Download tagging
9(1)
Application signing
9(1)
Privacy versus Security
10(1)
Weighing Convenience against Security
11(3)
Understanding Your Risks
14(1)
The Theory and Practice of Best Practices
15(1)
Seven Things You Should Do Right Now
16(10)
Update your software
16(1)
Set up a standard user account
17(2)
Change your keychain password
19(1)
Turn off all unneeded sharing features
20(2)
Turn on your firewall
22(1)
Switch from WEP or nothing to WPA
23(2)
Back up your Mac
25(1)
Summary
26(1)
Securing Your Mac against Theft
27(22)
Security Cables and Locks
27(2)
Laptop Lockers
29(1)
Other Theft Deterrents
29(3)
Laptop alarms (hardware)
29(1)
Laptop alarms (software)
29(1)
Login banners
30(2)
Marking a Mac for Recovery
32(1)
Tracking labels
32(1)
Operation Identification
33(1)
Tracking and Recovering Stolen Macs
33(15)
Using tracking software and services
34(4)
Using command-line software to track a Mac
38(5)
Tracking a Mac with Back to My Mac
43(5)
Summary
48(1)
Working with User Accounts
49(44)
How Accounts Affect Security
49(3)
The notion of accounts
49(1)
What a Mac OS X account is
50(1)
How accounts work
51(1)
The principle of least privilege
51(1)
Understanding POSIX Permissions
52(10)
Read, write, and execute
52(1)
User, group, and other
53(1)
Viewing file permissions
53(1)
Octal permissions
54(1)
Modifying file permissions
55(1)
Modifying file ownership
56(1)
Using the Get Info window
56(2)
Using the umask
58(3)
The other permission bits
61(1)
Types of Accounts
62(7)
Administrator accounts
62(2)
Standard accounts
64(1)
Managed accounts with parental controls
64(1)
Guest account
65(1)
Sharing Only accounts
66(1)
The root account
67(1)
System accounts
68(1)
Groups
68(1)
Configuring an Account
69(6)
Creating a new user
69(2)
Setting user options
71(2)
Creating groups
73(2)
Adjusting Login Options
75(2)
Using Parental Controls
77(6)
Using the Sudo Command
83(4)
How sudo works
84(1)
Sudo syntax
84(1)
Sudo limitations and risks
85(1)
Modifying the sudoers file
86(1)
Using Access Control Lists
87(4)
What's an access control list?
87(1)
Configuring access control lists
87(1)
Access control list options
88(3)
Summary
91(2)
Configuring Basic Security Settings
93(34)
General Settings
93(9)
Requiring a password to wake a computer
93(2)
Disabling automatic login
95(1)
Locking System Preferences
96(2)
Setting automatic logout
98(1)
Secure virtual memory
99(1)
Location Services settings
100(1)
Infrared receiver settings
100(2)
FileVault
102(3)
How FileVault works
102(1)
Setting up FileVault
103(2)
Firewall
105(3)
MobileMe Settings
108(6)
Account settings
109(1)
Sync settings
110(1)
iDisk settings
111(1)
Back to My Mac settings
112(2)
Energy Saver Settings
114(4)
Setting computer, display, and disk sleep
115(1)
Waking for network access
116(2)
Spotlight Settings
118(1)
AirPort Preferences
119(2)
Assistive Device Access
121(1)
Software Update
122(3)
Terminal
125(1)
Summary
125(2)
The Mac OS X Keychain
127(26)
How Keychains Work
127(3)
What Keychains Can Store
130(1)
Passwords
130(1)
Public keys, private keys, and certificates
130(1)
Secure notes
131(1)
Understanding Keychain Alerts
131(3)
Request to use your keychain
132(1)
Permission to use an existing item
132(1)
Alert that an application has changed
133(1)
Safari and the Keychain
134(3)
Using Keychain Access
137(15)
Customizing the view
137(2)
Managing keychain items
139(2)
Managing keychains
141(3)
Using secure notes
144(1)
Working with certificates
145(4)
Repairing damaged keychains
149(2)
Resetting a keychain
151(1)
Summary
152(1)
Working with Passwords
153(30)
Understanding Passwords
153(8)
What makes a password secure?
154(1)
Exploring password threats
155(3)
Identification versus security
158(1)
Multifactor authentication
159(1)
Managing your passwords
160(1)
The Varieties of Mac OS X Passwords
161(4)
User account passwords
161(1)
FileVault master password
162(1)
The root password
163(1)
Keychain passwords
163(1)
Firmware passwords
163(1)
Wi-Fi passwords
163(1)
Disk image passwords
164(1)
Apple ID password
165(1)
Network passwords
165(1)
Creating Good Passwords
165(5)
Avoiding easily guessed passwords
166(1)
Password length and complexity
166(1)
Password mnemonics
167(1)
Using patterns safely
168(1)
Reusing passwords
169(1)
Using Password Assistant
170(2)
Using Third-Party Password Utilities
172(4)
Password generators
172(1)
Password managers
173(3)
Resetting an Administrator's Password
176(1)
Using the original administrator account
176(1)
Using a Mac OS X Install DVD
176(1)
Using a Firmware Password
177(3)
Using Smart Cards, Tokens, and Biometric Authentication Devices
180(1)
Smart cards and tokens
180(1)
One-time password tokens
181(1)
Biometric devices
181(1)
Summary
181(2)
Securely Sharing System Resources
183(38)
Using Shared System Resources Wisely
183(1)
DVD or CD Sharing
184(2)
Screen Sharing
186(2)
File Sharing
188(5)
Activating File Sharing
188(2)
Choosing file-sharing protocols
190(1)
Changing which items are shared
191(1)
Granting access to users and groups
192(1)
Printer Sharing
193(2)
Scanner Sharing
195(3)
Web Sharing
198(3)
Activating Web Sharing
198(1)
Publishing web pages
198(1)
Making your web server visible to the outside world
199(2)
Web-sharing negatives
201(1)
Remote Login
201(2)
Remote Management
203(3)
Remote Apple Events
206(2)
Xgrid Sharing
208(2)
Internet Sharing
210(3)
Bluetooth Sharing
213(6)
Sharing files via Bluetooth
214(1)
Setting up Bluetooth Sharing
215(3)
Sharing an Internet connection via Bluetooth
218(1)
Summary
219(2)
Backing Up Your Mac
221(36)
Backup Basics
221(4)
What to back up
222(1)
Which media to use
223(1)
How often to back up
223(1)
Versioned backups
224(1)
Bootable duplicates
224(1)
Offsite backups
225(1)
Choosing Backup Software
225(4)
How many computers are you backing up?
226(1)
What type(s) of backup do you need?
227(1)
What media will you use?
227(1)
How should data be restored?
227(1)
What other special features do you need?
228(1)
Bottom-line recommendations
229(1)
Using Time Machine
229(9)
How Time Machine works
230(1)
Choosing hardware for Time Machine
231(1)
Configuring Time Machine
232(2)
Managing Time Machine behavior
234(1)
Restoring data from Time Machine
235(3)
Creating Bootable Duplicates
238(9)
What's a bootable duplicate?
238(1)
Using SuperDuper!
239(3)
Using Carbon Copy Cloner
242(3)
Other options
245(1)
Starting up from a bootable duplicate
246(1)
Using Internet Backup Services
247(3)
Internet backup basics
247(1)
Choosing a provider
248(2)
Managing Backup Media
250(1)
Offsite backups
250(1)
Keeping media comfortable
251(1)
Testing and recopying media
251(1)
RAID and Data Redundancy
251(5)
Mirrored RAIDs and backup
252(1)
Do you need a RAID?
252(1)
Choosing a RAID system
253(1)
Configuring a RAID with Disk Utility
254(2)
Summary
256(1)
Part II: Protecting Your Privacy
257(204)
Securing Email, Chat, and Voice over IP
259(56)
Understanding Email Security
259(4)
Using secure authentication
261(1)
Using SSL for sending and receiving email
262(1)
Signing email messages
262(1)
Encrypting email messages
263(1)
Encrypting data on your disk
263(1)
Logging In Securely
263(3)
Secure logins in Mail
264(1)
Secure logins in Entourage
265(1)
Secure logins in Thunderbird
266(1)
Using SSL for Incoming and Outgoing Mail
266(8)
How SSL works for email
267(1)
Configuring SSL for incoming mail
267(4)
Configuring SSL for outgoing mail
271(3)
Using SSL for webmail
274(2)
Gmail
275(1)
Hotmail
275(1)
MobileMe
275(1)
Yahoo! Mail
275(1)
Digitally Signing and Encrypting Email
276(14)
When and why to encrypt your email
277(1)
Using S/MIME in Apple Mail
278(8)
Using PGP or GPG for encrypted email
286(4)
Stopping Spam
290(13)
Understanding spammers
290(2)
Learning basic spam-filtering concepts
292(3)
Configuring your email client's spam filter
295(6)
Using third-party spam filters
301(1)
Other spam-filtering strategies
302(1)
Examining Message Headers and Source
303(5)
Message headers
304(3)
Message source
307(1)
iChat Security
308(3)
Adjusting iChat privacy settings
308(2)
Using encryption for iChat
310(1)
Securing Instant Messaging and Voice over IP with Third-Party Software
311(2)
Skype
312(1)
Zfone
312(1)
Adium
313(1)
Psi
313(1)
Summary
313(2)
Browsing the Web Securely
315(64)
The Challenges of Secure Browsing
316(4)
Privacy
316(1)
Fraud
317(1)
Malware
318(1)
Inappropriate content
318(1)
Annoyances
319(1)
Using SSL Encryption
320(5)
Checking a certificate
322(1)
Responding to certificate warnings
322(3)
Keeping Form Information Safe
325(9)
Using your browser's form-filling feature
326(5)
Third-party web form password tools
331(3)
Protecting Yourself from Harmful Downloads
334(4)
Protecting Yourself from Phishing Schemes
338(2)
Checking source URLs
338(1)
Using Extended Validation certificates
339(1)
Using a password manager to fill in data
340(1)
Using third-party anti-phishing software
340(1)
Covering Your Browsing Tracks
340(23)
The browsing records your Mac stores
341(1)
Prevention versus cleanup
342(1)
Managing cookies
343(8)
Using Safari's Private Browsing feature
351(1)
Using Safari's data removal features
352(2)
Handling private data with Firefox
354(2)
Using third-party web privacy software
356(4)
Cleaning up other browsing traces
360(3)
Browsing Anonymously
363(8)
What information you normally reveal
364(1)
Hiding your IP address by using anonymous proxy servers
365(4)
Hiding your IP address by using onion routing
369(1)
Masking other browser details
370(1)
Blocking Ads, Pop-up Windows, and Flash
371(6)
Using browser settings
372(2)
Using Hostal
374(1)
Using other ad-blocking software
375(2)
Blocking Other Undesirable Content
377(1)
Summary
378(1)
Securely Accessing Other Computers
379(30)
Transferring Files
379(8)
FTP, SCP, SFTP, and FTPS
380(1)
WebDAV
381(1)
Other protocols
382(1)
Remote file transfers in the Finder
382(2)
Using file-transfer software
384(3)
Controlling Another Computer Remotely
387(10)
Using Mac OS X Screen Sharing
388(6)
Using Apple Remote Desktop
394(1)
Using VNC
394(2)
Using Timbuktu Pro
396(1)
Using SSH for Remote Login
397(10)
Using SSH with password authentication
398(2)
Using key-based authentication
400(2)
Tunneling other services through SSH
402(5)
Summary
407(2)
Using Virtual Private Networks
409(14)
What Is a Virtual Private Network?
409(2)
VPN Varieties
411(3)
PPTP
411(1)
L2TP over IPsec
412(1)
Cisco IPsec
412(1)
SSL/TLS and OpenVPN
412(1)
Zero-configuration VPNs
413(1)
Choosing a VPN Provider
414(2)
Configuring Your Mac for VPN Access
416(6)
Using the Network preference pane
416(3)
Using other VPN tools
419(3)
Summary
422(1)
Encrypting and Securely Deleting Files
423(38)
File-Encryption Basics
424(5)
Encryption algorithms
424(1)
Passwords and keys
425(1)
Choosing what to encrypt
426(1)
Encryption pitfalls and misunderstandings
427(2)
Encrypting Individual Files and Folders
429(4)
Encrypting files on the command line
430(1)
Encrypting files and folders with third-party software
430(3)
Working with Encrypted Disk Images
433(9)
Encrypting disk images with Disk Utility
434(3)
Encrypting disk images with PGP
437(4)
Using other encrypted disk image products
441(1)
Using FileVault
442(5)
FileVault virtues and vices
442(2)
Deciding whether FileVault is for you
444(1)
Configuring FileVault
445(2)
Encrypting an Entire Disk
447(5)
PGP Whole Disk Encryption
448(1)
Check Point Full Disk Encryption
449(1)
WinMagic SecureDoc
450(2)
Using Hardware-Encrypted Drives
452(3)
Key-based enclosures
453(1)
Keypad-based enclosures
453(1)
Biometric enclosures
454(1)
Externally authenticating enclosures
454(1)
Self-encrypting drive mechanisms
454(1)
Securely Deleting Files
455(2)
Using the Secure Empty Trash command
456(1)
Erasing empty space with Disk Utility
456(1)
Using third-party utilities
457(1)
Securely Erasing Disks
457(2)
Recovering Deleted Files
459(1)
Summary
460(1)
Part III: Network Security Fundamentals
461(154)
Guarding against Malware
463(32)
The Varieties of Malware
464(3)
Viruses
464(1)
Macro viruses
464(1)
Worms
465(1)
Trojan horses
465(1)
Zombie software
466(1)
Spyware
466(1)
Adware
466(1)
Keystroke loggers
466(1)
Rootkits
467(1)
Macs as Malware Carriers
467(2)
Assessing Your Mac's Vulnerability
469(1)
Common-Sense Malware Protection
469(2)
Choosing Anti-Malware Software
471(11)
Factors to consider
472(1)
ClamXav
472(1)
Intego VirusBarrier, Internet Security Barrier, and NetBarrier
473(2)
iAntiVirus
475(1)
Internet Cleanup
476(1)
Kaspersky Anti-Virus for Mac
477(1)
MacScan
477(1)
McAfee VirusScan
478(1)
Norton AntiVirus for Mac
479(2)
Sophos Anti-Virus
481(1)
Trend Micro Smart Surfing for Mac
481(1)
Using Outbound Firewalls
482(5)
Little Snitch
483(1)
NetBarrier
484(1)
Norton Firewall for Mac
485(2)
Internet Cleanup
487(1)
What Anti-Malware Software Can't Do
487(1)
Securing Windows on a Mac
488(5)
Security risks with Boot Camp and virtualization software
488(1)
Protecting your Windows installation
489(3)
Choosing anti-malware software for Windows
492(1)
Summary
493(2)
Securing Your Wired Network
495(18)
Understanding Gateways, Modems, and Routers
496(3)
Gateways
496(1)
Modems
496(1)
Hubs, switches, and routers
497(1)
Access points
498(1)
Understanding NAT, DHCP, and IPv6
499(4)
NAT
499(2)
DHCP
501(1)
IPv6 network security
502(1)
Using Port Forwarding
503(2)
Using a DMZ
505(1)
Genuine DMZs
505(1)
DMZ hosts
506(1)
Using NAT-PMP or UPnP
506(1)
Using Proxy Servers
507(2)
Using 802.1X
509(3)
The authentication server
510(1)
The authenticator
510(1)
The supplicant
510(2)
Summary
512(1)
Securing Your Wireless Network
513(36)
Wireless Security Basics
514(5)
Protecting your access point
514(1)
Controlling wireless network visibility
514(1)
Controlling wireless network access
515(1)
Encrypting your wireless connection
516(3)
Configuring an AirPort Base Station
519(20)
Setting the base station security options
520(2)
Setting wireless options
522(17)
Setting up a guest network
539(1)
Configuring Third-Party Access Points
539(2)
Access point configuration basics
540(1)
2Wire
540(1)
Belkin
540(1)
D-Link
540(1)
Linksys
541(1)
Netgear
541(1)
Wireless Security Settings on Your Mac
541(2)
Using Public Wi-Fi Hotspots
543(2)
Using Wi-Fi Scanning Software
545(2)
Summary
547(2)
Using Firewalls
549(28)
Understanding How Firewalls Work
549(3)
Firewall terminology
550(1)
Why firewalls exist
550(1)
Basic firewall operation
551(1)
Do you need a firewall?
551(1)
Using Mac OS X's Application Firewall
552(5)
How the application firewall works
553(1)
When to use the application firewall
554(1)
Configuring the application firewall
554(3)
Using IPFW
557(13)
The IPFW process
558(1)
IPFW syntax
558(2)
Creating an IPFW ruleset
560(1)
Creating an IPFW shell script
561(1)
Creating an IPFW launchd item
562(1)
Configuring IPFW rules with third-party utilities
563(7)
Using Other Third-Party Firewall Software
570(5)
Intego NetBarrier
570(1)
IPNetSentryX and IPNetRouterX
571(2)
Norton Firewall for Mac
573(2)
Summary
575(2)
Web Server Security
577(20)
The Basics of Running a Secure Web Server
577(8)
General considerations
578(1)
Sharing settings
578(2)
Firewall settings
580(1)
Network and routing setup
580(1)
Apache settings
581(1)
File permissions
582(2)
Dynamic website content
584(1)
Using HTTP Authentication
585(3)
Securing a Site with SSL
588(4)
Creating a certificate and activating SSL
589(2)
Redirecting HTTP traffic to HTTPS
591(1)
Avoiding Injection Attacks
592(2)
Database Security
594(1)
Summary
595(2)
Using Logs
597(18)
Log Basics
597(3)
What logs can tell you about security
598(1)
What information is logged?
598(1)
Storing logs safely
599(1)
Log rotation
600(1)
Adjusting syslogd Behavior
600(2)
Finding Logs
602(1)
Understanding the Console and System Logs
602(6)
Viewing logs in Console
603(1)
Console basics
603(3)
Useful Console features
606(2)
Looking for Useful Information
608(6)
System log
608(1)
Apache logs
609(1)
Application firewall log
610(1)
FTP log
610(1)
Installer log
611(1)
Samba logs
611(1)
Secure log
612(1)
Other logs
613(1)
Summary
614(1)
Part IV: Advanced Security Measures
615(110)
Network Scanning
617(18)
What Can Network Scanning Reveal?
618(1)
Network Mapping
619(5)
Using nmap for network mapping
620(3)
Using IPNetMonitorX for network mapping
623(1)
Port Scanning
624(8)
Using Network Utility for port scanning
625(1)
Using nmap for port scanning
626(5)
Using IPNetMonitorX for port scanning
631(1)
Protecting Your Macs from Network Scanning
632(2)
Summary
634(1)
Vulnerability Scanning and Testing
635(30)
Using Nessus
636(11)
Nessus overview
636(1)
Installing and configuring Nessus
636(4)
Selecting scan targets
640(1)
Creating a scanning policy
641(4)
Running a customized scan
645(1)
Interpreting scan results
646(1)
Using SAINT and SAINTexploit
647(6)
Using Metasploit
653(10)
Metasploit interfaces
654(1)
Installing Metasploit
654(2)
Basic Metasploit procedures
656(1)
Running an exploit in the Metasploit console
657(1)
Running an exploit in the Metasploit GUI
658(5)
Summary
663(2)
Network Monitoring
665(26)
The Varieties of Network Monitoring
665(1)
Network Intrusion Detection Systems
666(11)
Using Snort as a NIDS
668(8)
Other third-party NIDS tools
676(1)
Network Intrusion Prevention Systems
677(8)
Using Snort as a NIPS
677(1)
Using IPNetSentryX or IPNetRouterX as a NIPS
678(5)
Using Intego NetBarrier
683(2)
Information Leak Detection Systems
685(3)
Using Snort for ILDS
686(1)
Other ILDS options
686(2)
Honeypot Monitoring
688(2)
Summary
690(1)
Monitoring File Integrity
691(8)
Understanding File Integrity Monitoring
691(1)
Tripwire
692(3)
Configuring Tripwire's policy
693(1)
Running Tripwire
694(1)
Radmind
695(1)
Samhain
695(1)
Baseline
696(1)
Sonar
697(1)
Summary
698(1)
Forensics: Discovering What Went Wrong
699(26)
Overview of Computer Forensics
700(3)
Live versus deferred analysis
700(1)
Choosing whether to save a disk image
701(1)
Preventing disk changes
702(1)
Looking for Rogue Processes
703(3)
Using Activity Monitor
703(2)
Using lsof
705(1)
Looking for Rogue Software
706(4)
Using MacForensicsLab
710(9)
Installing and configuring MacForensicsLab
711(4)
Acquiring an image
715(1)
Working with an image
716(2)
Auditing user data
718(1)
Other Forensics Tools
719(4)
MacLockPick II
719(2)
MacQuisition
721(1)
BlackBag Forensic Suite
722(1)
Mac Marshal
723(1)
The Sleuth Kit
723(1)
Summary
723(2)
Part V: Securing Mac OS X Server
725(128)
Mac OS X Server Security Overview
727(16)
Comparing Mac OS X and Mac OS X Server
727(4)
Mac OS X Server Security Fundamentals
731(1)
Understanding Open Directory
732(2)
Understanding Password Server and Kerberos
734(2)
Choosing Which Services to Run
736(3)
Configuring Local User Accounts
739(3)
Summary
742(1)
Using Directory Services
743(22)
Configuring Open Directory
743(19)
Activating Open Directory
744(1)
Choosing an Open Directory role
745(3)
LDAP settings
748(1)
Policy settings
749(4)
Configuring Open Directory users and groups
753(7)
Setting up Open Directory clients
760(2)
Using Windows Directory Services
762(2)
Using Active Directory for directory services
763(1)
Setting up a magic triangle
764(1)
Summary
764(1)
Working with SSL Certificates
765(12)
Certificate Overview
766(2)
Certificate authorities
766(1)
Self-signed certificates
767(1)
Creating a Self-Signed Certificate
768(2)
Requesting a Certificate from a Certificate Authority
770(2)
Creating and Using a Certificate Authority
772(2)
Managing Certificates
774(1)
Summary
775(2)
Securing Email Services
777(14)
Mac OS X Mail Server Overview
777(2)
Configuring Authentication Options
779(2)
Using SSL for Email
781(1)
Configuring Relay Options
782(2)
Configuring Spam and Virus Protection
784(3)
Turning On the Mail Service
787(3)
Summary
790(1)
Securing File Sharing
791(20)
About File-Sharing Protocols
791(2)
AFP
792(1)
SMB
792(1)
FTP
793(1)
NFS
793(1)
Configuring AFP
793(2)
Configuring SMB
795(2)
Configuring FTP
797(1)
Configuring NFS
798(1)
Configuring a Share Point
799(10)
Creating a share point
800(1)
Setting protocol options
800(4)
Restricting access to a share point
804(3)
Restricting access to file-sharing services
807(2)
Summary
809(2)
Securing the Web Server
811(14)
Configuring Web Options
811(3)
Configuring Web Services
814(2)
Controlling Site Access with Realms
816(3)
Enabling SSL
819(3)
Configuring the Forward Proxy Server
822(1)
Summary
823(2)
Securing Other Network Services
825(28)
Configuring the Mac OS X Server Firewall
825(8)
Basic setup
826(1)
Configuring standard services
827(1)
Advanced settings
828(3)
Protecting your network
831(2)
Using Mac OS X Server's VPN Services
833(4)
Choosing a transport protocol
833(1)
Configuring L2TP over IPsec
833(2)
Configuring PPTP
835(1)
Restricting VPN access
836(1)
Securing Address Book Server
837(2)
Securing iCal Server
839(2)
Securing iChat Server
841(2)
Securing the Mobile Access Server
843(4)
Securing MySQL
847(2)
Securing NetBoot
849(1)
Configuring RADIUS
850(2)
Summary
852(1)
Glossary
853(8)
Appendix: Where to Find More Information
861(4)
Apple Publications
861(1)
Take Control ebooks
862(1)
Other Books
863(1)
Online Resources
863(2)
Index 865
Joe Kissell was named one of MacTech's 25 most influential people in the Mac community for 2007. He's a senior contributor to Macworld and the senior editor of TidBITS, a website and weekly email newsletter about Macintosh and the Internet. Joe has worked in the Mac software industry since the early 1990s, including positions managing software development for Nisus Software and the Kensington Technology Group. He's the author of numerous books on Mac software.