Cargando…

The hacker's guide to OS X : exploiting OS X from the root up /

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a compr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bathurst, Robert
Otros Autores: Rogers, Russ, Ghassemlouei, Alijohn
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Syngress, �2013.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn819636701
003 OCoLC
005 20231117044801.0
006 m o d
007 cr cnu---unuuu
008 121129s2012 maua ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d UIU  |d E7B  |d B24X7  |d OCLCF  |d UIU  |d OCLCQ  |d OCLCA  |d U3W  |d D6H  |d WYU  |d LEAUB  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 9781597499507 
020 |z 1597499501 
035 |a (OCoLC)819636701 
050 4 |a QA76.774.M33  |b B38 2012 
082 0 4 |a 005.26/8  |2 23 
100 1 |a Bathurst, Robert. 
245 1 4 |a The hacker's guide to OS X :  |b exploiting OS X from the root up /  |c Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei. 
260 |a Boston :  |b Syngress,  |c �2013. 
300 |a 1 online resource (x, 235 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. Provides relevant information including some of the latest OS X threats. Easily accessible to those without any prior OS X experience. Useful tips and strategies for exploiting and compromising OS X systems. Includes discussion of defensive and countermeasure applications and how to use them. Covers mobile IOS vulnerabilities. 
588 0 |a Publisher supplied information; title not viewed. 
630 0 0 |a Mac OS. 
650 0 |a Operating systems (Computers)  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security  |0 (DNLM)D016494 
650 6 |a Syst�emes d'exploitation (Ordinateurs)  |0 (CaQQLa)201-0029698  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
630 0 7 |a Mac OS  |2 fast  |0 (OCoLC)fst01386304 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Operating systems (Computers)  |x Security measures  |2 fast  |0 (OCoLC)fst01046289 
700 1 |a Rogers, Russ. 
700 1 |a Ghassemlouei, Alijohn. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597499507  |z Texto completo