![]() |
![]() |
Your cart is empty |
||
Showing 1 - 7 of 7 matches in All Departments
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide
links from the authors, commentary and updates. *Provides relevant information including some of the latest OS X threats *Easily accessible to those without any prior OS X experience *Useful tips and strategies for exploiting and compromising OS X systems *Includes discussion of defensive and countermeasure applications and how to use them *Covers mobile IOS vulnerabilities
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
The Updated Version of the Bestselling Nessus Book.
The sexy, elegant design of the Apple PowerBook combined with the
Unix-like OS X operating system based on FreeBSD, have once again
made OS X the Apple of every hacker s eye. In this unique and
engaging book covering the brand new OS X 10.4 Tiger, the world s
foremost true hackers unleash the power of OS X for everything form
cutting edge research and development to just plain old fun.
Wireless networking has become standard in many business and
government networks. This book is the first book that focuses on
the methods used by professionals to perform WarDriving and
wireless pentration testing.
|
![]() ![]() You may like...
Bifidobacteria - Genomics and Molecular…
Baltasar Mayo, Douwe van Sinderen
Hardcover
R5,712
Discovery Miles 57 120
Budgeting Practice and Organisational…
David Dugdale, Stephen Lyne
Paperback
R1,469
Discovery Miles 14 690
The Economic Theory of Socialism and the…
Bruno Jossa, Gaetano Cuomo
Hardcover
R4,278
Discovery Miles 42 780
Anti-Differentiation and the Calculation…
Johannes Blumlein, Carsten Schneider
Hardcover
R4,618
Discovery Miles 46 180
A New Lease of Life? - Anglican Clergy…
Tony Neal, Leslie Francis
Paperback
R549
Discovery Miles 5 490
|