Master Your Mac


Book Description

Provides information to quickly improve and customize a Mac computer, enable undocumented Mac OS X features, automate tedious tasks, handle media, and troubleshoot disk issues.




The Art of Mac Malware


Book Description

A comprehensive guide to the threats facing Apple computers and the foundational knowledge needed to become a proficient Mac malware analyst. Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what’s inside. Discover the secrets of nation state backdoors, destructive ransomware, and subversive cryptocurrency miners as you uncover their infection methods, persistence strategies, and insidious capabilities. Then work with and extend foundational reverse-engineering tools to extract and decrypt embedded strings, unpack protected Mach-O malware, and even reconstruct binary code. Next, using a debugger, you’ll execute the malware, instruction by instruction, to discover exactly how it operates. In the book’s final section, you’ll put these lessons into practice by analyzing a complex Mac malware specimen on your own. You’ll learn to: Recognize common infections vectors, persistence mechanisms, and payloads leveraged by Mac malware Triage unknown samples in order to quickly classify them as benign or malicious Work with static analysis tools, including disassemblers, in order to study malicious scripts and compiled binaries Leverage dynamical analysis tools, such as monitoring tools and debuggers, to gain further insight into sophisticated threats Quickly identify and bypass anti-analysis techniques aimed at thwarting your analysis attempts A former NSA hacker and current leader in the field of macOS threat analysis, Patrick Wardle uses real-world examples pulled from his original research. The Art of Mac Malware: The Guide to Analyzing Malicious Software is the definitive resource to battling these ever more prevalent and insidious Apple-focused threats.




The Mac Hacker's Handbook


Book Description

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses.




The 4-hour Workweek


Book Description

How to reconstruct your life? Whether your dream is experiencing high-end world travel, earning a monthly five-figure income with zero management, or just living more and working less, this book teaches you how to double your income, and how to outsource your life to overseas virtual assistants for $5 per hour and do whatever you want.




Secure your Mac, with Mac OS X Lion


Book Description

Macs have a well-earned reputation for being secure, so you may think that you don’t have to lift a finger to keep your Mac protected. Sadly, that’s not the case. Apple has to balance security and convenience when it comes to shipping a new operating system. On one hand, no one wants his or her computer to get hacked. On the other hand, continually entering passwords and clicking Allow when you just want to check your email is annoying. A default installation of Lion (which you’re probably running on your Mac at the moment) leans more toward convenience and less toward security. This project shows you how to lock your Mac down a little more, just in case some scoundrel absconds with your precious Mac. (The criminal element is everywhere!) This is a single short project. Other single short projects available for individual sale include: Manage passwords, with 1Password Childproof your Mac, with Mac OS X Lion Spruce up iTunes, by adding album art and lyrics and removing duplicate songs Video conferencing, with Mac OS X Lion Powering your home theater from your Mac In addition, many more projects can be found in the 240 page The Mac OS X Lion Project Book.




Macs For Seniors For Dummies


Book Description

Your ticket to entering the exciting world of Macs! If you've always thought computers were too complicated and intimidating, you're in for a pleasant surprise! Written and designed with your unique needs in mind, Macs For Seniors For Dummies makes it faster and easier than ever to experience all your Apple computer has to offer. In no time, you'll find out how to stay connected with family and friends, explore the Internet, create and print documents, watch your favorite movies, get apps from the App Store, and so much more. From advice on which Mac you should buy to getting started with set up and configurations, this hands-on, accessible guide covers everything needed to help you make the most of your new computer. You'll learn how to customize OS X El Capitan, work with files and folders, connect to a printer, use Safari to browse the web, and keep in touch through social media—and that's just the tip of the iceberg. Set up your Mac and move around the desktop Make FaceTime calls and send emails Store photos and files using iCloud Play videos, music, and games With the help of Macs For Seniors For Dummies, you'll soon discover that you don't have to be a millennial to make a Mac your minion!




Switching to the Mac


Book Description

Demonstrates how to become adjusted to the Macintosh operating system and how to transfer data from a Windows system to a Macintosh, discussing topics such as moving files and Macintosh equivalents to Windows-only programs.




Malware Detection


Book Description

This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains cutting-edge behavior-based techniques to analyze and detect obfuscated malware. The book analyzes current trends in malware activity online, including botnets and malicious code for profit, and it proposes effective models for detection and prevention of attacks using. Furthermore, the book introduces novel techniques for creating services that protect their own integrity and safety, plus the data they manage.




MacBook


Book Description




Mac Life


Book Description

MacLife is the ultimate magazine about all things Apple. It’s authoritative, ahead of the curve and endlessly entertaining. MacLife provides unique content that helps readers use their Macs, iPhones, iPods, and their related hardware and software in every facet of their personal and professional lives.