• Complain

Glenn Fleishman - Take Control of Securing Your Mac

Here you can read online Glenn Fleishman - Take Control of Securing Your Mac full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Take Control Books, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Take Control of Securing Your Mac
  • Author:
  • Publisher:
    Take Control Books
  • Genre:
  • Year:
    2021
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Take Control of Securing Your Mac: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Take Control of Securing Your Mac" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Glenn Fleishman: author's other books


Who wrote Take Control of Securing Your Mac? Find out the surname, the name of the author of the book and a list of all author's works by series.

Take Control of Securing Your Mac — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Take Control of Securing Your Mac" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Take Control of Securing Your Mac 10 Glenn Fleishman Copyright 2021 Glenn - photo 1
Take Control of Securing Your Mac (1.0)

Glenn Fleishman

Copyright 2021, Glenn Fleishman. All rights reserved.
ISBN for EPUB and Mobi version: 978-1-95-454601-1
Table of Contents
Read Me First

Welcome to Take Control of Securing Your Mac, version 1.0, published in February 2021 by alt concepts inc. This book was written by Glenn Fleishman and edited by Joe Kissell.

This book helps you understand all the points of risk and weakness in using macOS on its own and connected to the internet, and offers detailed strategies and directions on securing it against outside intrusion, include malware and account hijacking.

If you want to share this ebook with a friend, we ask that you do so as you would with a physical book: lend it for a quick look, but ask your friend to buy a copy for careful reading or reference. Discounted classroom and user group copies are available.

Copyright 2021, Glenn Fleishman. All rights reserved.

About a Previous, Related Title

Take Control of Securing Your Mac is the spiritual successor to Joe Kissells book Take Control of Security for Mac Users, last updated in 2015 and discontinued in early 2017. As Apple has changed and added options for security, encryption, and privacy, it felt like this subject was a missing piece in our lineup.

This new book adapts parts of the previous work, but its full of fresh information and has been overhauled to reflect the choices and risks present in 2021.

Tip: This book is also a counterpoint to my separate title, Take Control of iOS & iPadOS Privacy and Networking, which covers remarkably little of the same material due to the different nature of how each platform handles privacy and offers security choices. (The big overlap is in Safari across all platforms.)

Updates and More

You can access extras related to this ebook on the web (use the link in , near the end; its available only to purchasers). On the ebooks Take Control Extras page, you can:

  • Download any available new version of the ebook for free, or buy any subsequent edition at a discount.

  • Download various formats, including PDF, EPUB, and Mobipocket. (Learn about reading on mobile devices on our Device Advice page.)

  • Read the ebooks blog. You may find new tips or information, as well as a link to an author interview.

If you bought this ebook from the Take Control website, it has been added to your account, where you can download it in other formats and access any future updates.

Introduction

A Mac is not impregnable, but Apple has increasingly added locks and protections over the last the decade that have made it ever harder to crack into its innards and scoop out your personal data, erase files or volumes, or install spyware. No matter whether a neer-do-well is close to hand or far away, it can be hard to damage a Mac.

Macs have nearly always been better than Windows at deterring remote attacks, however, and modern malware recognizes that. Nearly all attempts to subvert a Mac require that you visit a website, download a malicious program, and launch it, and sometimes bypass additional protections. You may be redirected to a website by evil advertising, or click a link in email you received. Its ever harder for unwanted and misleading software to even launch, much less for you to install it.

Apple has offered weaker controls around the physical security and integrity of its Macs than its software based on the notion that someone had to obtain direct access to a computer to put hands upon it. As laptop sales dominated the Mac and general computing market, Apple has pushed hard on this front, too, with improvements nearly every year or two in some aspect of securing the contents of your drives, preventing unwanted account access, and providing greater resistance from in-person attacks. This has special importance if your computer is lost or stolen, and someone can spend as much time trying to break into it as they want.

Somewhere between the two fall attacks and related improvement that make the core of macOS, all the system files and programs, ever harder for a remote or local attacker to subvert. Apple has worked through three increasingly rugged improvements that keep system files from being modified or overwritten, locking down that path of attack, too.

This book looks at all of the above to help you harden your Mac and learn the tricks that may be played so you can resist them. I also dig into what you can do in case you cant log in to your Mac or its lost or stolen, as Apple has improved those tools as well.

Which Models and OS Releases This Book Covers

Because of Apples continuously improving Mac software and hardware security, I cover macOS 10.14 Mojave, 10.15 Catalina, and 11.0 Big Sur. That encompasses several years worth of Mac models:

  • Mac models that predate USB-C connections, back to the earliest that can run Mojave, some of which date back to 2012; see this list

  • The short-lived 12-inch MacBook with USB-C

  • 2016 MacBook Pros with Thunderbolt 3 and the T1 security chip (Touch ID only)

  • 2017 and later Macs with Thunderbolt 3 and the T2 security chip (Secure Enclave and other features in addition to Touch ID on laptop models)

  • M-series Apple silicon Macs released starting in 2020 with the M1 chip that include Thunderbolt 3 and the security options found in the T2 chip and beyond

Quick Start to Securing Your Mac

Security is a multi-pronged process that combines understanding risk, checking status, acting appropriately, and deploying changes and potentially new software. Start by reading two early chapters, after which you can read in any order to learn what and why to do next.

Get grounded in security:
  • Understand what security is and how it applies to you; see

  • Get started with simple changes and new behaviors; see

Share things with other people:
  • Learn to set up network access without exposing your Mac unnecessarily; see

  • Make use of cloud services for sharing; see

Lock down your Mac and your data:
  • Protect your Mac from outside attack and snooping; see

  • Configure disk and boot protection to deter risk from physical access to your Mac; see

  • Avoid exposing your data; see

Recover access and your actual Mac :
  • Prepare for and recover lost access; see

  • If your Mac goes missing, find out what you can do to track it down, lock it, or wipe it; see

Start with Security Basics

Security has a broad meaning in everyday life, but a more specific one when it comes to data, networks, computers, and mobile devices.

In this chapter, I want to introduce you to what you have at risk and what your goals are in protecting your Mac, as part of the philosophy that youll find throughout this book.

What Security Means

As a general rule, we talk about security when we mean a way to reduce the likelihood of harm. You go through a security checkpoint at the airport. You have a home security system. A lecture is cancelled due to security concerns. An ad for a bike lock claims it offers high security.

With computing and networking, however, security is more specific: its the measures you take to prevent harm to you by the extraction, interception, loss, or corruption of your

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Take Control of Securing Your Mac»

Look at similar books to Take Control of Securing Your Mac. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Take Control of Securing Your Mac»

Discussion, reviews of the book Take Control of Securing Your Mac and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.