![]() |
![]() |
Your cart is empty |
||
Showing 1 - 1 of 1 matches in All Departments
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide
links from the authors, commentary and updates. *Provides relevant information including some of the latest OS X threats *Easily accessible to those without any prior OS X experience *Useful tips and strategies for exploiting and compromising OS X systems *Includes discussion of defensive and countermeasure applications and how to use them *Covers mobile IOS vulnerabilities
|
![]() ![]() You may like...
Strategies for the Creation and…
Colette Henry, Barbara Filipa Casqueira Coelho Gabriel, …
Hardcover
R5,784
Discovery Miles 57 840
Financial Mathematics - A Computational…
K. Pereira, N. Modhien, …
Paperback
R326
Discovery Miles 3 260
A Christmas Carol: York Notes for GCSE…
Charles Dickens, Lucy English
Paperback
![]() R191 Discovery Miles 1 910
Proceedings of the 2nd Advances in…
Fauziah Nordin, Abdul Kadir Othman, …
Hardcover
The Neuroscientist Who Lost Her Mind…
Barbara K.Lipska, Elaine McArdle
Paperback
Psychological Assessment in Treatment…
James N. Butcher, Julian Perry
Hardcover
R2,243
Discovery Miles 22 430
|