Charles Edge’s research while affiliated with University School and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (21)


Enterprise Mac Security
  • Book

January 2016

·

24 Reads

·

2 Citations

Charles Edge

·

Daniel O’Donnell

Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new 10.11 operating system. A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be have been true in certain cases, security on the Mac has always still been a crucial issue. With the release of OS X 10.11, the operating system is taking large strides in getting even more secure. Even still, when sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats, whether these have been exploited or not. This book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience. The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security. What You Will Learn • The newest security techniques on Mac OS X from the best and brightest • Security details of Mac OS X for the desktop and server, and how to secure these systems • The details of Mac forensics and Mac hacking • How to tackle Apple wireless security Who This Book Is For This book is for new users, switchers, power users, and administrators that need to make sure their Mac systems are secure.


Citations (3)


... Deshotels et al. [19,20] analyze semantic flaws in sandbox profiles, which weaken the security provided by default sandbox profiles, and might be used as gadgets in exploit chains. Edge and O'Donnell [21] provide practical examples that show how custom sandbox profiles can be used to harden apps. Levin [34,35,36] and Miller et al. [45] offer insights into the inner workings of macOS and iOS, including implementation details of the sandboxing mechanism. ...

Reference:

State of the Sandbox: Investigating macOS Application Security
Enterprise Mac Security
  • Citing Book
  • January 2016

... The first computer virus detected was Elk Cloner, which infected Apple II operating systems with floppy disks, and displayed a comic message on infected computers. [1] Elk Cloner, developed by 15-year-old Richard Skrenta in 1982, was considered a joke, but it showed the possibility and possibility of a possible malware being installed in Apple computer memory, with the ability to prevent users from removing it. The term computer virus was not used again until a year later, when Fred Cohen, the scientific paper has been published in title Computer viruses with theory and experiments in 1983 the work was for students are graduated from California University. ...

Malware Security: Combating Viruses, Worms, and Root Kits
  • Citing Chapter
  • January 2016