|
Showing 1 - 8 of
8 matches in All Departments
Contrary to popular belief, there has never been any shortage of
Macintosh-related security issues. OS9 had issues that warranted
attention. However, due to both ignorance and a lack of research,
many of these issues never saw the light of day. No solid
techniques were published for executing arbitrary code on OS9, and
there are no notable legacy Macintosh exploits. Due to the combined
lack of obvious vulnerabilities and accompanying exploits,
Macintosh appeared to be a solid platform. Threats to Macintosh's
OS X operating system are increasing in sophistication and number.
Whether it is the exploitation of an increasing number of holes,
use of rootkits for post-compromise concealment or disturbed denial
of service, knowing why the system is vulnerable and understanding
how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power,
all the tools, and all the geekery of Linux is present in Mac OS X.
Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX
platform....Now, you can master the boot process, and Macintosh
forensic software.
* Look Back Before the Flood and Forward Through the 21st Century
Threatscape Back in the day, a misunderstanding of Macintosh
security was more or less industry-wide. Neither the administrators
nor the attackers knew much about the platform. Learn from Kevin
Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from
desktops, laptops, and servers into the world of consumer
technology (iPhones, iPods, and so on), what are the implications
for the further spread of malware and other security breaches? Find
out from David Harley.
* Malware Detection and the Mac Understand why the continuing
insistence of vociferous Mac zealots that it "can't happen here" is
likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick
graphical interface, and near-bulletproof reliability, Apple's Mac
OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure
and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use
the information obtained during a WarDrive, to successfully
penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through
exploitation techniques, tricks, and features of both OS X Tiger
and Leopard, using real-world scenarios for explaining and
demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from
the bleak days of OS9. THere is now a wide array of encryption
choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the
security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends
The Newnes Know It All Series takes the best of what our authors
have written to create hard-working desk references that will be an
engineer's first port of call for key information, design
techniques and rules of thumb. Guaranteed not to gather dust on a
shelf
Communications engineers need to master a wide area of topics to
excel. The "Wireless Security Know It All" covers every angle
including Emerging Wireless Technologies and Security Issues,
Wireless LAN and MAN Security, as well as Wireless Personal Area
Networks.
A 360-degree view from our best-selling authors
Topics include Today s Wireless Technology, Security Definitions
and Concepts, and Wireless Handheld devices
The ultimate hard-working desk reference; all the essential
information, techniques and tricks of the trade in one volume"
The sexy, elegant design of the Apple PowerBook combined with the
Unix-like OS X operating system based on FreeBSD, have once again
made OS X the Apple of every hacker s eye. In this unique and
engaging book covering the brand new OS X 10.4 Tiger, the world s
foremost true hackers unleash the power of OS X for everything form
cutting edge research and development to just plain old fun.
OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple s
Macintosh computers and laptops. This book is not a reference to
every feature and menu item for OS X. Rather, it teaches hackers of
all types from software developers to security professionals to
hobbyists, how to use the most powerful (and often obscure)
features of OS X for wireless networking, WarDriving, software
development, penetration testing, scripting administrative tasks,
and much more.
* Analyst reports indicate that OS X sales will double in 2005. OS
X Tiger is currently the #1 selling software product on Amazon and
the 12-inch PowerBook is the #1 selling laptop
* Only book on the market directly appealing to groundswell of
hackers migrating to OS X
* Each chapter written by hacker most commonly associated with that
topic, such as Chris Hurley (Roamer) organizer of the World Wide
War Drive"
Wireless networking has become standard in many business and
government networks. This book is the first book that focuses on
the methods used by professionals to perform WarDriving and
wireless pentration testing.
Unlike other wireless networking and security books that have been
published in recent years, this book is geared primarily to those
individuals that are tasked with performing penetration testing on
wireless networks. This book continues in the successful vein of
books for penetration testers such as Google Hacking for
Penetration Testers and Penetration Tester s Open Source Toolkit.
Additionally, the methods discussed will prove invaluable for
network administrators tasked with securing wireless networks. By
understanding the methods used by penetration testers and attackers
in general, these administrators can better define the strategies
needed to secure their networks.
* According to a study by the Strategis Group more than one third
of the words population will own a wireless device by the end of
2008.
* The authors have performed hundreds of wireless penetration
tests, modeling their attack methods after those used by real world
attackers.
* Unlike other wireless books, this is geared specifically for
those individuals that perform security assessments and penetration
tests on wireless networks."
Wireless connectivity is now a reality in most businesses. Yet by
its nature, wireless networks are the most difficult to secure and
are often the favorite target of intruders. This book provides the
busy network administrator with best-practice solutions to securing
the wireless network
With the increased demand for mobile connectivity and the decrease
in cost and in the time required for installation, wireless network
connections will make up 20% of all corporate network connections
by the end of 2006.
With this increase in usage comes a commensurate increase in the
network s vulnerability to intrusion. This book provides the
typical network administrator with the basic tools and instruction
they need to maintain a secure network while allowing acceptable
access to users.
. A practical product and technology specific guideline to securing
a wireless networks for the busy System Administrator
. Takes a simplified multi-layered approach into easily deployed
plans for a straight forward understanding
. Does not bog you down with history, but offers practical useful
information for today"
The first two books in this series "Stealing the Network: How to
Own the Box" and "Stealing the Network: How to Own a Continent"
have become classics in the Hacker and Infosec communities because
of their chillingly realistic depictions of criminal hacking
techniques.
In this third installment, the all-star cast of authors tackle one
of the fastest growing crimes in the world: Identity Theft. Now,
the criminal hackers readers have grown to both love and hate try
to cover their tracks and vanish into thin air... "Stealing the
Network: How to Own an Identity" is the 3rd book in the "Stealing"
series, and continues in the tradition created by its predecessors
by delivering real-world network attack methodologies and hacking
techniques within a context of unique and original fictional
accounts created by some of the world's leading security
professionals and computer technologists. The seminal works in
TechnoFiction, this "STN" collection yet again breaks new ground by
casting light upon the mechanics and methods used by those lurking
on the darker side of the Internet, engaging in the fastest growing
crime in the world: Identity theft.
Cast upon a backdrop of "Evasion," surviving characters from "How
to Own a Continent" find themselves on the run, fleeing from both
authority and adversary, now using their technical prowess in a way
they never expected--to survive.
* The first two books in the series were best-sellers and have
established a cult following within the Hacker and Infosec
communities
* Identity theft is the fastest growing crime in the world, and
financial loss from identity theft is expected to reach $2 trillion
by the end of 2005
* All of the authors on thebook are world renowned, highly visible
information security experts who present at all of the top security
conferences including Black Hat, DefCon, and RSA and write for the
most popular magazines and Web sites including Information Security
Magazine, and SecurityFocus.com. All of these outlets will be used
to promote the book
"InfoSec Career Hacking" starts out by describing the many,
different InfoSec careers available including Security Engineer,
Security Analyst, Penetration Tester, Auditor, Security
Administrator, Programmer, and Security Program Manager. The
particular skills required by each of these jobs will be described
in detail, allowing the reader to identify the most appropriate
career choice for them.
Next, the book describes how the reader can build his own test
laboratory to further enhance his existing skills and begin to
learn new skills and techniques. The authors also provide keen
insight on how to develop the requisite soft skills to migrate form
the hacker to corporate world.
* The InfoSec job market will experience explosive growth over the
next five years, and many candidates for these positions will come
from thriving, hacker communities
* Teaches these hackers how to build their own test networks to
develop their skills to appeal to corporations and government
agencies
* Provides specific instructions for developing time, management,
and personal skills to build a successful InfoSec career
The practice of WarDriving is a unique combination of hobby,
sociological research, and security assessment. The act of driving
or walking through urban areas with a wireless-equipped laptop to
map both protected and un-protected wireless networks has sparked
intense debate amongst lawmakers, security professionals, and the
telecommunications industry. This first ever book on WarDriving is
written from the inside perspective of those who have created the
tools that make WarDriving possible and those who gather, analyze,
and maintain data on all secured and open wireless access points in
very major, metropolitan area worldwide. These insiders also
provide the information to secure your wireless network before it
is exploited by criminal hackers.
* Provides the essential information needed to protect and secure
wireless networks
* Written from the inside perspective of those who have created the
tools for WarDriving and those who gather, maintain and analyse
data on wireless networks
* This is the first book to deal with the hot topic of
WarDriving
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|