The Hacker's Guide to OS X: Exploiting OS X from the Root Up
Autor Alijohn Ghassemlouei, Robert Bathurst, Russ Rogersen Limba Engleză Paperback – 6 dec 2012
As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
- Provides relevant information including some of the latest OS X threats
- Easily accessible to those without any prior OS X experience
- Useful tips and strategies for exploiting and compromising OS X systems
- Includes discussion of defensive and countermeasure applications and how to use them
- Covers mobile IOS vulnerabilities
Preț: 341.58 lei
Preț vechi: 426.97 lei
-20% Nou
Puncte Express: 512
Preț estimativ în valută:
65.37€ • 67.83$ • 54.64£
65.37€ • 67.83$ • 54.64£
Carte tipărită la comandă
Livrare economică 15-29 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597499507
ISBN-10: 1597499501
Pagini: 248
Ilustrații: black & white illustrations, black & white tables, figures
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.59 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1597499501
Pagini: 248
Ilustrații: black & white illustrations, black & white tables, figures
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.59 kg
Editura: ELSEVIER SCIENCE
Public țintă
Security Professionals (Security Auditors, Security Engineers,), Cyber security professionals, hackers, programmers focused on secure coding, and reverse engineersCuprins
1. Introduction
2. Pre carbon
3. Post carbon
4. Filesystem
5. Footprint
6. Application and System Vulnerabilities
7. Defensive Applications
8. Offensive Tactics
9. Reverse Engineering
10. Mobile Platforms
11. Awesome Tips
2. Pre carbon
3. Post carbon
4. Filesystem
5. Footprint
6. Application and System Vulnerabilities
7. Defensive Applications
8. Offensive Tactics
9. Reverse Engineering
10. Mobile Platforms
11. Awesome Tips
Recenzii
"Authors Robert Bathurst, Russ Rogers and Alijohn Ghassemlouei detail the fundamentals of the OS X environment and its many vulnerabilities…The book is a like a slimmed-down version of Hacking Exposed for the Mac…in that it both shows how to attack the operating system, in addition to detailing defensive measures to stop attackers." --RSAConference.com, March 2013