|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn842439176 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
130510s2013 maua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d YDXCP
|d IDEBK
|d COO
|d DEBSZ
|d OCLCQ
|d CNSPO
|d OCLCQ
|d OCLCF
|d OCLCQ
|d LIV
|d OCLCQ
|d OCLCO
|d OCLCA
|d CEF
|d TOF
|d AU@
|d UAB
|d UKAHL
|d C6I
|d VLY
|d VT2
|d REDDC
|d TUHNV
|d CZL
|d DST
|d OCLCO
|d OCL
|d OCLCQ
|
019 |
|
|
|a 1103274041
|a 1162354943
|a 1229063242
|a 1243614209
|a 1295606081
|a 1300636692
|a 1303341803
|
020 |
|
|
|a 9781597499545
|
020 |
|
|
|a 1597499544
|
020 |
|
|
|z 9781597499507
|
020 |
|
|
|z 1597499501
|
020 |
|
|
|a 1283852268
|
020 |
|
|
|a 9781283852265
|
029 |
1 |
|
|a DEBBG
|b BV041121667
|
029 |
1 |
|
|a DEBSZ
|b 396765874
|
035 |
|
|
|a (OCoLC)842439176
|z (OCoLC)1103274041
|z (OCoLC)1162354943
|z (OCoLC)1229063242
|z (OCoLC)1243614209
|z (OCoLC)1295606081
|z (OCoLC)1300636692
|z (OCoLC)1303341803
|
037 |
|
|
|a CL0500000215
|b Safari Books Online
|
050 |
|
4 |
|a QA76.774.M33
|b B38 2013
|
082 |
0 |
4 |
|a 005/.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Bathurst, Robert.
|
245 |
1 |
4 |
|a The hacker's guide to OS X :
|b exploiting OS X from the root-up /
|c Rob Bathurst, Russ Rogers, Alijohn Ghassemlouei ; Pat Engebretson, technical editor.
|
260 |
|
|
|a Waltham, MA :
|b Syngress/Elsevier,
|c ©2013.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Half Title; The Hacker's Guide to OS X; Copyright; Contents; Foreword; 1 Introduction; Why You are Reading This Book?; What is Contained Within the Guide?; Chapter 1: The Introduction; Chapter 2: OS History; Chapter 3: The Filesystem; Chapter 4: Footprinting OSX; Chapter 5: Application and System Vulnerabilities; Chapter 6: Defensive Applications; Chapter 7: Offensive Tactics; Chapter 8: Reverse Engineering; Chapter 9: Mobile Platforms; Chapter 10: Tips, Tricks, and the Future; The Path Ahead; Reference; 2 History and Introduction to OSX; History and Introduction to OSX; OSX Origins.
|
505 |
8 |
|
|a A Byte of HistoryPowerPC Architecture and Transition to Intel; Firmware-EFI; File System-HFS+; Common Misconceptions; Better for Designers/Creative People; Secure; Perceptions; Capabilities; Environments Leveraging OSX; Home; Business; Security; Virtualization; Mobile Expansion; Appstore; What Next?; 3 The Filesystem; Introduction; What is a File System?; The Difference Between Memory Types; Partition Tables; Identifying GUIDs; Booting; Master Boot Records; Blessed be Thy Volume; Booting from the Network; Working up to HFS+; How a File System Works; File System Addressing; Disk Fragmentation.
|
505 |
8 |
|
|a The File System ForefathersFile System Layouts; Hierarchical File System (circa 1985); Microsoft File Systems; HFS Plus; Journaled HFS; MetaData; Understanding Forks; Data Forks; Resource Forks; Named Forks; Fiddling with the File System; Playing with Attributes; Hidden Files; Conclusion; 4 Footprinting OSX; Introduction; Off the Client; On the Client; Conclusion; 5 Application and System Vulnerabilities; Introduction; Understanding Vulnerabilities; Vulnerabilities are Equal Opportunity; Media Layers; Host Layers; History of Vulnerabilities in Apple Products; Mac OS X Specific.
|
505 |
8 |
|
|a A Recent Example-FlashbackHow it Works; Understanding Apple's Security Response; Apple iOS Specific; Keeping it Under Control; Advanced Persistent Threats; Apple Script; Conclusion; 6 Defensive Applications; Introduction; Secure Configurations; Passwords, Passphrases, and Multi-Factor Authentication; Account Access Restriction; FileVault; Firewall Configuration; Network Services; Kernel Extension Removal; Examining Commercial Tools; PrivacyScan by SecureMac; MacScan by SecureMac; Conclusion; 7 Offensive Tactics; Introduction; The Exploits; mDNSResponder UPnP Location Exploit.
|
505 |
8 |
|
|a Using the Ammo in the WeaponMS08-067 "Old reliable"; Web Exploits; Physical Attacks; Data Gathering and Extraction; Summary; References; 8 Reverse Engineering; Introduction; The Basics; Coding; Decompiling Journey; CPU Registers; Memory Monster; Assembly Time; Ripping It Apart; Taking It Home; Analysis Techniques; Summary; References; 9 Mobile Platforms; Introduction; Apple iOS Security Model and Overview; Insecurity Overview; Jailbreakme.com; ROP and Jailbreakme.com; redsn0w; Charlie Miller and Nitro; Safari JavaScript Vulnerability; Remote Attack Scenario; The Goods.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Mac OS.
|
630 |
0 |
7 |
|a Mac OS.
|2 blmlsh
|
630 |
0 |
7 |
|a Mac OS.
|2 fast
|0 (OCoLC)fst01386304
|
650 |
|
0 |
|a Apple computer.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Operating systems (Computers)
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Systèmes d'exploitation (Ordinateurs)
|
650 |
|
6 |
|a Apple (Ordinateurs)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a operating systems.
|2 aat
|
650 |
|
7 |
|a Operating systems (Computers)
|2 fast
|0 (OCoLC)fst01046280
|
650 |
|
7 |
|a Apple computer.
|2 fast
|0 (OCoLC)fst00811612
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
700 |
1 |
|
|a Rogers, Russ.
|
700 |
1 |
|
|a Ghassemlouei, Alijohn.
|
776 |
0 |
8 |
|i Print version:
|a Bathurst, Robert.
|t Hacker's guide to OS X.
|d Waltham, MA : Syngress/Elsevier, ©2013
|z 9781597499507
|w (DLC) 2012043002
|w (OCoLC)826899244
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597499507/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24673642
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis24345417
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9926391
|
994 |
|
|
|a 92
|b IZTAP
|