The hacker's guide to OS X exploiting OS X from the root up

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comp...

Descripción completa

Detalles Bibliográficos
Autor principal: Bathurst, Rob (-)
Otros Autores: Rogers, Russ, Ghassemlouei, Alijohn, Engebretson, Pat
Formato: Libro electrónico
Idioma:Inglés
Publicado: Waltham, Mass. : Syngress 2013.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628591106719
Descripción
Sumario:Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
Notas:Description based upon print version of record.
Descripción Física:1 online resource (249 p.)
Bibliografía:Includes bibliographical references and index.
ISBN:9781283852265
9781597499545