OS X exploits and defense
Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the system is vulnerable and how to defend it...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress
c2008.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627624806719 |
Sumario: | Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the system is vulnerable and how to defend it is critical to computer security. This book brings all this information together, providing a solid basis to help you succeed in protecting your organization from risk.* Cuts through the hype with a serious discussion of the security vulnerabilities of the Mac OS X operating system* Reve |
---|---|
Notas: | Description based upon print version of record. |
Descripción Física: | 1 online resource (348 p.) |
Bibliografía: | Includes bibliographical references (p. 320-321) and index. |
ISBN: | 9781281309129 9786611309121 9780080558769 |