OS X exploits and defense

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the system is vulnerable and how to defend it...

Descripción completa

Detalles Bibliográficos
Otros Autores: Baccas, Paul (-), Finisterre, Kevin
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Syngress c2008.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627624806719
Descripción
Sumario:Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the system is vulnerable and how to defend it is critical to computer security. This book brings all this information together, providing a solid basis to help you succeed in protecting your organization from risk.* Cuts through the hype with a serious discussion of the security vulnerabilities of the Mac OS X operating system* Reve
Notas:Description based upon print version of record.
Descripción Física:1 online resource (348 p.)
Bibliografía:Includes bibliographical references (p. 320-321) and index.
ISBN:9781281309129
9786611309121
9780080558769