Description |
1 online resource (x, 235 pages) : illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Bibliography |
Includes bibliographical references and index. |
Summary |
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. Provides relevant information including some of the latest OS X threats. Easily accessible to those without any prior OS X experience. Useful tips and strategies for exploiting and compromising OS X systems. Includes discussion of defensive and countermeasure applications and how to use them. Covers mobile IOS vulnerabilities. |
Note |
Publisher supplied information; title not viewed. |
Subject |
Mac OS.
|
|
Mac OS
|
|
Operating systems (Computers) -- Security measures.
|
|
Computer security.
|
|
Computer Security |
|
Systèmes d'exploitation (Ordinateurs) -- Sécurité -- Mesures.
|
|
Sécurité informatique.
|
|
Computer security
|
|
Operating systems (Computers) -- Security measures
|
Added Author |
Rogers, Russ.
|
|
Ghassemlouei, Alijohn.
|
ISBN |
9781597499507 |
|
1597499501 |
Standard No. |
AU@ 000050608237 |
|
AU@ 000051432842 |
|
AU@ 000060073788 |
|
AU@ 000067114161 |
|
CHNEW 001010815 |
|
DEBBG BV042305254 |
|
DEBSZ 405345992 |
|
NZ1 15189148 |
|