The hacker's guide to OS X exploiting OS X from the root up
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comp...
Main Author: | |
---|---|
Other Authors: | , , |
Format: | eBook |
Language: | Inglés |
Published: |
Waltham, Mass. :
Syngress
2013.
|
Edition: | 1st edition |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628591106719 |
Summary: | Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. |
---|---|
Item Description: | Description based upon print version of record. |
Physical Description: | 1 online resource (249 p.) |
Bibliography: | Includes bibliographical references and index. |
ISBN: | 9781283852265 9781597499545 |