Maximum Security 3rd Edition – Covers Macintosh Security & Hacking
Interested in computer security and hacking? This book is written from the system administrators stand point. Hundreds of pages on security issues, how to secure your system, how the hackers get it. Out of those pages there is a nice chapter on our favorite operating system Macintosh . Find a place for this book on your bookshelf as it makes a great companion to anyone interested in computer security. Even if your not interested in security now, you might run into the need for this book soon. Plus read up on Macintosh security, see some of your favorite applications discussed in this book.
The creator of SecureMac.com and Freaks Macintosh Archives has helped contribute to the book by revising the Macintosh chapter, covering the latest security news and hacker programs for the MacOS in depth giving incite and advise on the uses and procedures to securing your Mac!
This book is written for system administrators who need to know how to keep their systems secure from unauthorized use. The anonymous author takes a hacker’s view of various systems, focusing on how the system can be cracked and how you can secure the vulnerable areas.
The book makes it clear from the outset that you cannot rely on commercial software for security. Some of it is flawed, and even the best of it has to be used correctly to provide even the most basic security measures. The author scrutinizes such operating systems as Microsoft Windows, Unix, Novell, and Macintosh. He details many of the tools crackers use to attack the system, including several that have legitimate uses for system administration. Rather than merely cataloging areas of risk and showing how various flaws can be exploited, the author makes every effort to show how security holes can be avoided and remedied. Maximum Security tells you which software to avoid and then details which security tools are invaluable, providing the URLs necessary to acquire them. An enclosed CD-ROM provides links to many of the tools and resources discussed in the book. The CD-ROM also leads you to several online documents where you can learn more about Internet security in general and specifics for securing your own site. –Elizabeth Lewis