The hacker's guide to OS X: exploiting OS X from the root up
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a compr...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boston
Syngress
© 2013
|
Schlagwörter: | |
Links: | http://www.sciencedirect.com/science/book/9781597499507 http://www.sciencedirect.com/science/book/9781597499507 |
Zusammenfassung: | Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. Provides relevant information including some of the latest OS X threats. Easily accessible to those without any prior OS X experience. Useful tips and strategies for exploiting and compromising OS X systems. Includes discussion of defensive and countermeasure applications and how to use them. Covers mobile IOS vulnerabilities |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 online resource (x, 235 pages) illustrations |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125937 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2012 xx a||| o|||| 00||| eng d | ||
035 | |a (ZDB-33-ESD)ocn819636701 | ||
035 | |a (OCoLC)819636701 | ||
035 | |a (DE-599)BVBBV046125937 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.26/8 |2 23 | |
100 | 1 | |a Bathurst, Robert |e Verfasser |4 aut | |
245 | 1 | 0 | |a The hacker's guide to OS X |b exploiting OS X from the root up |c Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei |
264 | 1 | |a Boston |b Syngress |c © 2013 | |
300 | |a 1 online resource (x, 235 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. Provides relevant information including some of the latest OS X threats. Easily accessible to those without any prior OS X experience. Useful tips and strategies for exploiting and compromising OS X systems. Includes discussion of defensive and countermeasure applications and how to use them. Covers mobile IOS vulnerabilities | ||
630 | 0 | 4 | |a Mac OS. |
650 | 7 | |a Mac OS. |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Operating systems (Computers) / Security measures |2 fast | |
650 | 4 | |a Operating systems (Computers) |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Rogers, Russ |e Sonstige |4 oth | |
700 | 1 | |a Ghassemlouei, Alijohn |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597499501 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597499507 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597499507 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-031506390 | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597499507 |l DE-860 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818985994345512960 |
---|---|
any_adam_object | |
author | Bathurst, Robert |
author_facet | Bathurst, Robert |
author_role | aut |
author_sort | Bathurst, Robert |
author_variant | r b rb |
building | Verbundindex |
bvnumber | BV046125937 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn819636701 (OCoLC)819636701 (DE-599)BVBBV046125937 |
dewey-full | 005.26/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.26/8 |
dewey-search | 005.26/8 |
dewey-sort | 15.26 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02556nam a2200433zc 4500</leader><controlfield tag="001">BV046125937</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2012 xx a||| o|||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn819636701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)819636701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125937</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.26/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bathurst, Robert</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The hacker's guide to OS X</subfield><subfield code="b">exploiting OS X from the root up</subfield><subfield code="c">Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 235 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. Provides relevant information including some of the latest OS X threats. Easily accessible to those without any prior OS X experience. Useful tips and strategies for exploiting and compromising OS X systems. Includes discussion of defensive and countermeasure applications and how to use them. Covers mobile IOS vulnerabilities</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Mac OS.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mac OS.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Operating systems (Computers) / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghassemlouei, Alijohn</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597499501</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597499507</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597499507</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506390</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597499507</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046125937 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:43:44Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506390 |
oclc_num | 819636701 |
open_access_boolean | |
physical | 1 online resource (x, 235 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2013 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress |
record_format | marc |
spelling | Bathurst, Robert Verfasser aut The hacker's guide to OS X exploiting OS X from the root up Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei Boston Syngress © 2013 1 online resource (x, 235 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. Provides relevant information including some of the latest OS X threats. Easily accessible to those without any prior OS X experience. Useful tips and strategies for exploiting and compromising OS X systems. Includes discussion of defensive and countermeasure applications and how to use them. Covers mobile IOS vulnerabilities Mac OS. Mac OS. fast Computer security fast Operating systems (Computers) / Security measures fast Operating systems (Computers) Security measures Computer security Rogers, Russ Sonstige oth Ghassemlouei, Alijohn Sonstige oth Erscheint auch als Druck-Ausgabe 1597499501 Erscheint auch als Druck-Ausgabe 9781597499507 http://www.sciencedirect.com/science/book/9781597499507 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Bathurst, Robert The hacker's guide to OS X exploiting OS X from the root up Mac OS. Mac OS. fast Computer security fast Operating systems (Computers) / Security measures fast Operating systems (Computers) Security measures Computer security |
title | The hacker's guide to OS X exploiting OS X from the root up |
title_auth | The hacker's guide to OS X exploiting OS X from the root up |
title_exact_search | The hacker's guide to OS X exploiting OS X from the root up |
title_full | The hacker's guide to OS X exploiting OS X from the root up Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei |
title_fullStr | The hacker's guide to OS X exploiting OS X from the root up Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei |
title_full_unstemmed | The hacker's guide to OS X exploiting OS X from the root up Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei |
title_short | The hacker's guide to OS X |
title_sort | the hacker s guide to os x exploiting os x from the root up |
title_sub | exploiting OS X from the root up |
topic | Mac OS. Mac OS. fast Computer security fast Operating systems (Computers) / Security measures fast Operating systems (Computers) Security measures Computer security |
topic_facet | Mac OS. Computer security Operating systems (Computers) / Security measures Operating systems (Computers) Security measures |
url | http://www.sciencedirect.com/science/book/9781597499507 |
work_keys_str_mv | AT bathurstrobert thehackersguidetoosxexploitingosxfromtherootup AT rogersruss thehackersguidetoosxexploitingosxfromtherootup AT ghassemloueialijohn thehackersguidetoosxexploitingosxfromtherootup |