The Mac hacker's handbook:
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system--and ho...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Indianapolis, IN
Wiley
2009
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781118080337/?ar |
Zusammenfassung: | As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system--and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle those weaknesses. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xvi, 368 Seiten) illustrations |
ISBN: | 9780470481479 0470481471 0470395362 9780470395363 9781118080337 1118080335 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047525711 | ||
003 | DE-627-1 | ||
005 | 20240228114406.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2009 xx |||||o 00| ||eng c | ||
020 | |a 9780470481479 |c electronic bk. |9 978-0-470-48147-9 | ||
020 | |a 0470481471 |c electronic bk. |9 0-470-48147-1 | ||
020 | |a 0470395362 |9 0-470-39536-2 | ||
020 | |a 9780470395363 |9 978-0-470-39536-3 | ||
020 | |a 9781118080337 |9 978-1-118-08033-7 | ||
020 | |a 1118080335 |9 1-118-08033-5 | ||
035 | |a (DE-627-1)047525711 | ||
035 | |a (DE-599)KEP047525711 | ||
035 | |a (ORHE)9781118080337 | ||
035 | |a (DE-627-1)047525711 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 260 |2 rvk | ||
084 | |a ST 261 M06 |2 rvk | ||
084 | |a ST 276 |2 rvk | ||
084 | |a ST 277 |2 rvk | ||
100 | 1 | |a Miller, Charles |d 1951- |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The Mac hacker's handbook |c Charlie Miller, Dino A. Dai Zovi |
264 | 1 | |a Indianapolis, IN |b Wiley |c 2009 | |
300 | |a 1 Online-Ressource (xvi, 368 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system--and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle those weaknesses. | ||
630 | 2 | 0 | |a Mac OS |
650 | 0 | |a Computer security | |
650 | 4 | |a Mac OS | |
650 | 4 | |a Mac OS | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computersicherheit | |
650 | 4 | |a MacOS X | |
650 | 4 | |a Macintosh | |
700 | 1 | |a Dai Zovi, Dino |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780470395363 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780470395363 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781118080337/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
936 | r | v | |a ST 260 |
936 | r | v | |a ST 261 M06 |
936 | r | v | |a ST 276 |
936 | r | v | |a ST 277 |
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047525711 |
---|---|
_version_ | 1829007796283113472 |
adam_text | |
any_adam_object | |
author | Miller, Charles 1951- |
author2 | Dai Zovi, Dino |
author2_role | ctb |
author2_variant | z d d zd zdd |
author_facet | Miller, Charles 1951- Dai Zovi, Dino |
author_role | aut |
author_sort | Miller, Charles 1951- |
author_variant | c m cm |
building | Verbundindex |
bvnumber | localTUM |
classification_rvk | ST 260 ST 261 M06 ST 276 ST 277 |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047525711 (DE-599)KEP047525711 (ORHE)9781118080337 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02850cam a22007092c 4500</leader><controlfield tag="001">ZDB-30-ORH-047525711</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114406.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2009 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470481479</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-48147-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470481471</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-48147-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470395362</subfield><subfield code="9">0-470-39536-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470395363</subfield><subfield code="9">978-0-470-39536-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118080337</subfield><subfield code="9">978-1-118-08033-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118080335</subfield><subfield code="9">1-118-08033-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047525711</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047525711</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781118080337</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047525711</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 260</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261 M06</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Miller, Charles</subfield><subfield code="d">1951-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The Mac hacker's handbook</subfield><subfield code="c">Charlie Miller, Dino A. Dai Zovi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 368 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system--and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle those weaknesses.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computersicherheit</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">MacOS X</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Macintosh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dai Zovi, Dino</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780470395363</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780470395363</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781118080337/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="936" ind1="r" ind2="v"><subfield code="a">ST 260</subfield></datafield><datafield tag="936" ind1="r" ind2="v"><subfield code="a">ST 261 M06</subfield></datafield><datafield tag="936" ind1="r" ind2="v"><subfield code="a">ST 276</subfield></datafield><datafield tag="936" ind1="r" ind2="v"><subfield code="a">ST 277</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047525711 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:59Z |
institution | BVB |
isbn | 9780470481479 0470481471 0470395362 9780470395363 9781118080337 1118080335 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvi, 368 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley |
record_format | marc |
spelling | Miller, Charles 1951- VerfasserIn aut The Mac hacker's handbook Charlie Miller, Dino A. Dai Zovi Indianapolis, IN Wiley 2009 1 Online-Ressource (xvi, 368 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system--and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle those weaknesses. Mac OS Computer security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computersicherheit MacOS X Macintosh Dai Zovi, Dino MitwirkendeR ctb 9780470395363 Erscheint auch als Druck-Ausgabe 9780470395363 |
spellingShingle | Miller, Charles 1951- The Mac hacker's handbook Mac OS Computer security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computersicherheit MacOS X Macintosh |
title | The Mac hacker's handbook |
title_auth | The Mac hacker's handbook |
title_exact_search | The Mac hacker's handbook |
title_full | The Mac hacker's handbook Charlie Miller, Dino A. Dai Zovi |
title_fullStr | The Mac hacker's handbook Charlie Miller, Dino A. Dai Zovi |
title_full_unstemmed | The Mac hacker's handbook Charlie Miller, Dino A. Dai Zovi |
title_short | The Mac hacker's handbook |
title_sort | mac hacker s handbook |
topic | Mac OS Computer security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computersicherheit MacOS X Macintosh |
topic_facet | Mac OS Computer security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computersicherheit MacOS X Macintosh |
work_keys_str_mv | AT millercharles themachackershandbook AT daizovidino themachackershandbook AT millercharles machackershandbook AT daizovidino machackershandbook |