The hacker's guide to OS X: exploiting OS X from the root up
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boston
Syngress
c2013
|
Schlagwörter: | |
Links: | http://www.sciencedirect.com/science/book/9781597499507 |
Beschreibung: | Includes bibliographical references and index Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. Provides relevant information including some of the latest OS X threats. Easily accessible to those without any prior OS X experience. Useful tips and strategies for exploiting and compromising OS X systems. Includes discussion of defensive and countermeasure applications and how to use them. Covers mobile IOS vulnerabilities |
Umfang: | 1 Online-Ressource (x, 235 p.) |
ISBN: | 9781597499507 1597499501 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305254 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2012 xx o|||| 00||| eng d | ||
020 | |a 9781597499507 |9 978-1-59749-950-7 | ||
020 | |a 1597499501 |9 1-59749-950-1 | ||
035 | |a (OCoLC)819636701 | ||
035 | |a (DE-599)BVBBV042305254 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.26/8 |2 23 | |
100 | 1 | |a Bathurst, Robert |e Verfasser |4 aut | |
245 | 1 | 0 | |a The hacker's guide to OS X |b exploiting OS X from the root up |c Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei |
264 | 1 | |a Boston |b Syngress |c c2013 | |
300 | |a 1 Online-Ressource (x, 235 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. Provides relevant information including some of the latest OS X threats. Easily accessible to those without any prior OS X experience. Useful tips and strategies for exploiting and compromising OS X systems. Includes discussion of defensive and countermeasure applications and how to use them. Covers mobile IOS vulnerabilities | ||
630 | 0 | 4 | |a Mac OS. |
650 | 7 | |a Mac OS. |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Operating systems (Computers) / Security measures |2 fast | |
650 | 4 | |a Operating systems (Computers) |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Rogers, Russ |e Sonstige |4 oth | |
700 | 1 | |a Ghassemlouei, Alijohn |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597499507 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
912 | |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027742246 |
Datensatz im Suchindex
_version_ | 1818979932306407424 |
---|---|
any_adam_object | |
author | Bathurst, Robert |
author_facet | Bathurst, Robert |
author_role | aut |
author_sort | Bathurst, Robert |
author_variant | r b rb |
building | Verbundindex |
bvnumber | BV042305254 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)819636701 (DE-599)BVBBV042305254 |
dewey-full | 005.26/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.26/8 |
dewey-search | 005.26/8 |
dewey-sort | 15.26 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02414nam a2200457zc 4500</leader><controlfield tag="001">BV042305254</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2012 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499507</subfield><subfield code="9">978-1-59749-950-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499501</subfield><subfield code="9">1-59749-950-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)819636701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305254</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.26/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bathurst, Robert</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The hacker's guide to OS X</subfield><subfield code="b">exploiting OS X from the root up</subfield><subfield code="c">Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 235 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. Provides relevant information including some of the latest OS X threats. Easily accessible to those without any prior OS X experience. Useful tips and strategies for exploiting and compromising OS X systems. Includes discussion of defensive and countermeasure applications and how to use them. Covers mobile IOS vulnerabilities</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Mac OS.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mac OS.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Operating systems (Computers) / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghassemlouei, Alijohn</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597499507</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742246</subfield></datafield></record></collection> |
id | DE-604.BV042305254 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:07:23Z |
institution | BVB |
isbn | 9781597499507 1597499501 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742246 |
oclc_num | 819636701 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (x, 235 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2013 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress |
record_format | marc |
spelling | Bathurst, Robert Verfasser aut The hacker's guide to OS X exploiting OS X from the root up Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei Boston Syngress c2013 1 Online-Ressource (x, 235 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. Provides relevant information including some of the latest OS X threats. Easily accessible to those without any prior OS X experience. Useful tips and strategies for exploiting and compromising OS X systems. Includes discussion of defensive and countermeasure applications and how to use them. Covers mobile IOS vulnerabilities Mac OS. Mac OS. fast Computer security fast Operating systems (Computers) / Security measures fast Operating systems (Computers) Security measures Computer security Rogers, Russ Sonstige oth Ghassemlouei, Alijohn Sonstige oth http://www.sciencedirect.com/science/book/9781597499507 Verlag Volltext |
spellingShingle | Bathurst, Robert The hacker's guide to OS X exploiting OS X from the root up Mac OS. Mac OS. fast Computer security fast Operating systems (Computers) / Security measures fast Operating systems (Computers) Security measures Computer security |
title | The hacker's guide to OS X exploiting OS X from the root up |
title_auth | The hacker's guide to OS X exploiting OS X from the root up |
title_exact_search | The hacker's guide to OS X exploiting OS X from the root up |
title_full | The hacker's guide to OS X exploiting OS X from the root up Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei |
title_fullStr | The hacker's guide to OS X exploiting OS X from the root up Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei |
title_full_unstemmed | The hacker's guide to OS X exploiting OS X from the root up Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei |
title_short | The hacker's guide to OS X |
title_sort | the hacker s guide to os x exploiting os x from the root up |
title_sub | exploiting OS X from the root up |
topic | Mac OS. Mac OS. fast Computer security fast Operating systems (Computers) / Security measures fast Operating systems (Computers) Security measures Computer security |
topic_facet | Mac OS. Computer security Operating systems (Computers) / Security measures Operating systems (Computers) Security measures |
url | http://www.sciencedirect.com/science/book/9781597499507 |
work_keys_str_mv | AT bathurstrobert thehackersguidetoosxexploitingosxfromtherootup AT rogersruss thehackersguidetoosxexploitingosxfromtherootup AT ghassemloueialijohn thehackersguidetoosxexploitingosxfromtherootup |