![]() |
![]() |
Your cart is empty |
||
Showing 1 - 7 of 7 matches in All Departments
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide
links from the authors, commentary and updates. *Provides relevant information including some of the latest OS X threats *Easily accessible to those without any prior OS X experience *Useful tips and strategies for exploiting and compromising OS X systems *Includes discussion of defensive and countermeasure applications and how to use them *Covers mobile IOS vulnerabilities
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
The Updated Version of the Bestselling Nessus Book.
The sexy, elegant design of the Apple PowerBook combined with the
Unix-like OS X operating system based on FreeBSD, have once again
made OS X the Apple of every hacker s eye. In this unique and
engaging book covering the brand new OS X 10.4 Tiger, the world s
foremost true hackers unleash the power of OS X for everything form
cutting edge research and development to just plain old fun.
Wireless networking has become standard in many business and
government networks. This book is the first book that focuses on
the methods used by professionals to perform WarDriving and
wireless pentration testing.
|
![]() ![]() You may like...
Cooperative Learning and World-Readiness…
Ghazi M. Ghaith, Ghada M. Awada
Hardcover
R1,478
Discovery Miles 14 780
A Guide to the PCA Arbitration Rules
Brooks Daly, Evgeniya Goriatcheva, …
Hardcover
R8,280
Discovery Miles 82 800
Environmental Applications of Microbial…
Pardeep Singh, Vijay Kumar, …
Paperback
R4,694
Discovery Miles 46 940
|