The Hacker's Guide to OS X

Exploiting OS X from the Root Up

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Hacker's Guide to OS X by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei ISBN: 9781597499545
Publisher: Elsevier Science Publication: December 31, 2012
Imprint: Syngress Language: English
Author: Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
ISBN: 9781597499545
Publisher: Elsevier Science
Publication: December 31, 2012
Imprint: Syngress
Language: English

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers

As a resource to the reader, the companion website will provide links from the authors, commentary and updates.

  • Provides relevant information including some of the latest OS X threats
  • Easily accessible to those without any prior OS X experience
  • Useful tips and strategies for exploiting and compromising OS X systems
  • Includes discussion of defensive and countermeasure applications and how to use them
  • Covers mobile IOS vulnerabilities
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers

As a resource to the reader, the companion website will provide links from the authors, commentary and updates.

More books from Elsevier Science

Cover of the book Handbook of Metal Injection Molding by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Personality Development Across the Lifespan by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Collective Action 2.0 by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Human Colonization of the Arctic: The Interaction Between Early Migration and the Paleoenvironment by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Social and Ethical Aspects of Radiation Risk Management by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Atmospheric Science by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Solid State Physics by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book TCP/IP Sockets in C by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Advances in Imaging and Electron Physics by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Advances in Genetics by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Low Cycle Fatigue and Elasto-Plastic Behaviour of Materials by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Numerical Methods for Roots of Polynomials - Part I by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book The AIDS Pandemic by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Globins and Other Nitric Oxide-Reactive Proteins, Part A by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Cover of the book Doing Bayesian Data Analysis by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy