Starting an app development company is one of the most rewarding things you'll ever do. Or it sends you into bankruptcy and despair. If only there was a guide out there, to help you along the way. This book is your guide to starting, running, expanding, buying, and selling a development consulting firm. But not just any consulting firm, one with a focus on Apple.
Apple has been gaining adoption in businesses ranging from traditional 5 person start ups to some of the largest companies in the world. Author Charles Edge has been there since the days that the Mac was a dying breed in business, then saw the advent of the iPhone and iPad, and has consulted for environments ranging from the home user to the largest Apple deployments in the world. Now there are well over 10,000 shops out there consulting on Apple in business and more appearing every day.Build, Run, and Sell Your Apple Consulting Practice takes you through the journey, from just an idea to start a company all the way through mergers and finally into selling your successful and growing Apple development business.What You'll LearnCreate and deploy grassroots as well as more traditional marketing plans
Engage in the community of developers and companies that will hire you and vice versa
Effecively buy and sell your time and talents to grow your business while remaining agile
Who This Book Is For
Business owners looking to grow and diversify their companies as well as developers, engineers, and designers working on Apple apps who would like to branch out into starting their own consulting business.
Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new 10.11 operating system.A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be have been true in certain cases, security on the Mac has always still been a crucial issue. With the release of OS X 10.11, the operating system is taking large strides in getting even more secure. Even still, when sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats, whether these have been exploited or not.This book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience.The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security.What You Will LearnThe newest security techniques on Mac OS X from the best and brightest
Security details of Mac OS X for the desktop and server, and how to secure these systemsThe details of Mac forensics and Mac hacking
How to tackle Apple wireless security
Who This Book Is For
This book is for new users, switchers, power users, and administrators that need to make sure their Mac systems are secure.
Charles Edge and Bill Smith provide detailed explanations of the technology required for large-scale Mac OS X deployments and show you how to integrate it with other operating systems and applications.Now in its second edition, Enterprise Mac Administrator's Guide addresses the growing size and spread of Mac OS X deployments in corporations and institutions worldwide. In some cases, this is due to the growth of traditional Mac environments, but for the most part it has to do with organizations instituting device choice and switcher campaigns, where Windows and/or Linux environments are migrating to Mac OS X. There is a steep culture shock with many of these migrations. The products that are used are different, the nomenclature is different, and most importantly the best practices for dealing with the operating system and updates are very different.Apple provides a number of tools to help automate and guide IT toward managing a large number of Mac OS X computers-it has since before Mac OS X was initially released. However, if you want to put together all of the pieces to tell a compelling story about how to run an IT department or a deployment of Macs, you need to compile information from a number of different sources. This book provides explanations of the technology required.What You'll LearnChoose a directory services model that works for your organization and integrate it into your existing model
Choose an imaging model and begin imaging workstations with or without third-party productsUse the Mac App Store and Apple's Volume Purchasing Program to deploy apps
Leverage scripting techniques to reduce labor for the IT department
Provide network services (file sharing, mobile home folders, messaging, etc.) to the Mac OS X clients
Who This Book Is For
System administrators and IT professionals who need to manage a large number of Mac OS X computers, be they Mac OS X-based servers or workstations. The assumption is that readers are somewhat familiar with Mac OS X and/or IT in general, but not that they are familiar with the Apple system internals, server services, or deployment techniques.
Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away.You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that's necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts. With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they're completely secure. You'll also work on getting standard QA environments built out, so you can test more effectively with less effort. Apple is forging their own path in IT. They trade spots with Amazon, Google, and Microsoft as the wealthiest company to ever exist. And they will not be constrained by 30 or more years of dogma in the IT industry. You can try to shoehorn Apple devices into outdated modes of device management, or you can embrace Apple's stance on management with the help of this book. What You'll LearnDeploy profiles across devices effectively and securely
Install apps remotely both from the app store and through custom solutions
Work natively with Apple environments rather than retrofitting older IT solutions
Who This Book Is ForMac administrators within organizations that want to integrate with the current Apple ecosystem, including Windows administrators learning how to use/manage Macs, mobile administrators working with iPhones and iPads, and mobile developers tasked with creating custom apps for internal, corporate distribution.