Take control of securing your Mac
Keep your Mac safe from intruders, malware, and more! Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. Glenn Fleishman guides you through configuring your Mac to protect against phishing, malware, network intrusion, social engineering, and invaders...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Saskatoon, Canada
alt concepts
[2022]
|
Ausgabe: | Second edition. |
Schriftenreihe: | Take control
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-082179948 | ||
003 | DE-627-1 | ||
005 | 20240228121801.0 | ||
007 | cr uuu---uuuuu | ||
008 | 221012s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781990783159 |c electronic bk. |9 978-1-990783-15-9 | ||
020 | |a 1990783155 |c electronic bk. |9 1-990783-15-5 | ||
035 | |a (DE-627-1)082179948 | ||
035 | |a (DE-599)KEP082179948 | ||
035 | |a (ORHE)9781990783159 | ||
035 | |a (DE-627-1)082179948 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.4/46 |2 23/eng/20220913 | |
100 | 1 | |a Fleishman, Glenn |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Take control of securing your Mac |c Glenn Fleishman |
250 | |a Second edition. | ||
264 | 1 | |a Saskatoon, Canada |b alt concepts |c [2022] | |
300 | |a 1 online resource (182 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Take control | |
506 | |a Access restricted to LAC onsite clients. |2 star | ||
520 | |a Keep your Mac safe from intruders, malware, and more! Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. Glenn Fleishman guides you through configuring your Mac to protect against phishing, malware, network intrusion, social engineering, and invaders who might tap physically into your computer. Glenn teaches how to secure your data at rest and in motion. Learn about built-in privacy settings, the Secure Enclave, FileVault, sandboxing, VPNs, recovering a missing Mac, and much more. Covers Ventura and Monterey. The digital world has never seemed more riddled with danger, even as Apple has done a fairly remarkable job across decades at keeping our Macs safe. But the best foot forward with security is staying abreast of past risks and anticipating future ones. Take Control of Securing Your Mac gives you all the insight and directions you need to ensure your Mac is safe from external intrusion and thieves or other ne'er-do-wells with physical access. Security and privacy are tightly related, and Take Control of Securing Your Mac helps you understand how macOS has increasingly compartmentalized and protected your personal data, and how to allow only the apps you want to access specific folders, your contacts, and other information. | ||
630 | 2 | 0 | |a Mac OS |
650 | 0 | |a Macintosh (Computer) |x Security measures | |
650 | 4 | |a Mac OS | |
650 | 4 | |a Macintosh (Ordinateur) ; Sécurité ; Mesures | |
650 | 4 | |a Macintosh (Computer) ; Security measures | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781990783159/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-082179948 |
---|---|
_version_ | 1818767250771935232 |
adam_text | |
any_adam_object | |
author | Fleishman, Glenn |
author_facet | Fleishman, Glenn |
author_role | aut |
author_sort | Fleishman, Glenn |
author_variant | g f gf |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)082179948 (DE-599)KEP082179948 (ORHE)9781990783159 |
dewey-full | 005.4/46 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.4/46 |
dewey-search | 005.4/46 |
dewey-sort | 15.4 246 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02761cam a22004332 4500</leader><controlfield tag="001">ZDB-30-ORH-082179948</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121801.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">221012s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781990783159</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-990783-15-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1990783155</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-990783-15-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082179948</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP082179948</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781990783159</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082179948</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.4/46</subfield><subfield code="2">23/eng/20220913</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fleishman, Glenn</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Take control of securing your Mac</subfield><subfield code="c">Glenn Fleishman</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Saskatoon, Canada</subfield><subfield code="b">alt concepts</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (182 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Take control</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Access restricted to LAC onsite clients.</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Keep your Mac safe from intruders, malware, and more! Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. Glenn Fleishman guides you through configuring your Mac to protect against phishing, malware, network intrusion, social engineering, and invaders who might tap physically into your computer. Glenn teaches how to secure your data at rest and in motion. Learn about built-in privacy settings, the Secure Enclave, FileVault, sandboxing, VPNs, recovering a missing Mac, and much more. Covers Ventura and Monterey. The digital world has never seemed more riddled with danger, even as Apple has done a fairly remarkable job across decades at keeping our Macs safe. But the best foot forward with security is staying abreast of past risks and anticipating future ones. Take Control of Securing Your Mac gives you all the insight and directions you need to ensure your Mac is safe from external intrusion and thieves or other ne'er-do-wells with physical access. Security and privacy are tightly related, and Take Control of Securing Your Mac helps you understand how macOS has increasingly compartmentalized and protected your personal data, and how to allow only the apps you want to access specific folders, your contacts, and other information.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Macintosh (Computer)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Macintosh (Ordinateur) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Macintosh (Computer) ; Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781990783159/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-082179948 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:46:54Z |
institution | BVB |
isbn | 9781990783159 1990783155 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (182 pages) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | alt concepts |
record_format | marc |
series2 | Take control |
spelling | Fleishman, Glenn VerfasserIn aut Take control of securing your Mac Glenn Fleishman Second edition. Saskatoon, Canada alt concepts [2022] 1 online resource (182 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Take control Access restricted to LAC onsite clients. star Keep your Mac safe from intruders, malware, and more! Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. Glenn Fleishman guides you through configuring your Mac to protect against phishing, malware, network intrusion, social engineering, and invaders who might tap physically into your computer. Glenn teaches how to secure your data at rest and in motion. Learn about built-in privacy settings, the Secure Enclave, FileVault, sandboxing, VPNs, recovering a missing Mac, and much more. Covers Ventura and Monterey. The digital world has never seemed more riddled with danger, even as Apple has done a fairly remarkable job across decades at keeping our Macs safe. But the best foot forward with security is staying abreast of past risks and anticipating future ones. Take Control of Securing Your Mac gives you all the insight and directions you need to ensure your Mac is safe from external intrusion and thieves or other ne'er-do-wells with physical access. Security and privacy are tightly related, and Take Control of Securing Your Mac helps you understand how macOS has increasingly compartmentalized and protected your personal data, and how to allow only the apps you want to access specific folders, your contacts, and other information. Mac OS Macintosh (Computer) Security measures Macintosh (Ordinateur) ; Sécurité ; Mesures Macintosh (Computer) ; Security measures TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781990783159/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Fleishman, Glenn Take control of securing your Mac Mac OS Macintosh (Computer) Security measures Macintosh (Ordinateur) ; Sécurité ; Mesures Macintosh (Computer) ; Security measures |
title | Take control of securing your Mac |
title_auth | Take control of securing your Mac |
title_exact_search | Take control of securing your Mac |
title_full | Take control of securing your Mac Glenn Fleishman |
title_fullStr | Take control of securing your Mac Glenn Fleishman |
title_full_unstemmed | Take control of securing your Mac Glenn Fleishman |
title_short | Take control of securing your Mac |
title_sort | take control of securing your mac |
topic | Mac OS Macintosh (Computer) Security measures Macintosh (Ordinateur) ; Sécurité ; Mesures Macintosh (Computer) ; Security measures |
topic_facet | Mac OS Macintosh (Computer) Security measures Macintosh (Ordinateur) ; Sécurité ; Mesures Macintosh (Computer) ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781990783159/?ar |
work_keys_str_mv | AT fleishmanglenn takecontrolofsecuringyourmac |