O'Reilly logo

Mac® OS X Security by Brian Wotring, Preston Norvell, Bruce Potter

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix C. Further Reading

In this book we have covered many topics related to Mac OS X security. However, an exhaustive analysis of each of those topics would require entire books to themselves, not chapters.

This appendix is a collection of additional resources applicable to Mac OS X security. In addition, we have set up a web site (http://www.macsecurity.org/thebook) for updated information and example configurations found throughout this book.

Chapter 1—Security Foundations

  • Mel, H. X and Doris M. Baker. Cryptography Decrypted. Addison-Wesley, 2000.

    A good introduction to cryptography. This book explains concepts and algorithms fundamental to many of the applications and protocols used by Mac OS X.

  • Schneier, Bruce. Secrets and Lies: Digital Security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required