The hacker's guide to OS X: exploiting OS X from the root-up
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress/Elsevier
2013
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597499507/?ar |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781597499545 1597499544 1283852268 9781283852265 9781597499507 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047648384 | ||
003 | DE-627-1 | ||
005 | 20240228115230.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2013 xx |||||o 00| ||eng c | ||
020 | |a 9781597499545 |9 978-1-59749-954-5 | ||
020 | |a 1597499544 |9 1-59749-954-4 | ||
020 | |a 1283852268 |9 1-283-85226-8 | ||
020 | |a 9781283852265 |9 978-1-283-85226-5 | ||
020 | |a 9781597499507 |9 978-1-59749-950-7 | ||
035 | |a (DE-627-1)047648384 | ||
035 | |a (DE-599)KEP047648384 | ||
035 | |a (ORHE)9781597499507 | ||
035 | |a (DE-627-1)047648384 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005/.8 |2 23 | |
100 | 1 | |a Bathurst, Robert |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The hacker's guide to OS X |b exploiting OS X from the root-up |c Rob Bathurst, Russ Rogers, Alijohn Ghassemlouei ; Pat Engebretson, technical editor |
264 | 1 | |a Waltham, MA |b Syngress/Elsevier |c 2013 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
546 | |a English. | ||
630 | 2 | 0 | |a Mac OS |
650 | 0 | |a Apple computer | |
650 | 0 | |a Computer security | |
650 | 0 | |a Operating systems (Computers) | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Mac OS | |
650 | 4 | |a Mac OS | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 4 | |a Apple (Ordinateurs) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a operating systems | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Apple computer | |
650 | 4 | |a Computer security | |
700 | 1 | |a Rogers, Russ |e MitwirkendeR |4 ctb | |
700 | 1 | |a Ghassemlouei, Alijohn |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781597499507 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597499507 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597499507/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047648384 |
---|---|
_version_ | 1829007776631750657 |
adam_text | |
any_adam_object | |
author | Bathurst, Robert |
author2 | Rogers, Russ Ghassemlouei, Alijohn |
author2_role | ctb ctb |
author2_variant | r r rr a g ag |
author_facet | Bathurst, Robert Rogers, Russ Ghassemlouei, Alijohn |
author_role | aut |
author_sort | Bathurst, Robert |
author_variant | r b rb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047648384 (DE-599)KEP047648384 (ORHE)9781597499507 |
dewey-full | 005/.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005/.8 |
dewey-search | 005/.8 |
dewey-sort | 15 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02092cam a22006012c 4500</leader><controlfield tag="001">ZDB-30-ORH-047648384</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115230.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499545</subfield><subfield code="9">978-1-59749-954-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499544</subfield><subfield code="9">1-59749-954-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283852268</subfield><subfield code="9">1-283-85226-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283852265</subfield><subfield code="9">978-1-283-85226-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499507</subfield><subfield code="9">978-1-59749-950-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648384</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047648384</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597499507</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648384</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005/.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bathurst, Robert</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The hacker's guide to OS X</subfield><subfield code="b">exploiting OS X from the root-up</subfield><subfield code="c">Rob Bathurst, Russ Rogers, Alijohn Ghassemlouei ; Pat Engebretson, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress/Elsevier</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Apple computer</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mac OS</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Apple (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Apple computer</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghassemlouei, Alijohn</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597499507</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597499507</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597499507/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047648384 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:41Z |
institution | BVB |
isbn | 9781597499545 1597499544 1283852268 9781283852265 9781597499507 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Syngress/Elsevier |
record_format | marc |
spelling | Bathurst, Robert VerfasserIn aut The hacker's guide to OS X exploiting OS X from the root-up Rob Bathurst, Russ Rogers, Alijohn Ghassemlouei ; Pat Engebretson, technical editor Waltham, MA Syngress/Elsevier 2013 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record English. Mac OS Apple computer Computer security Operating systems (Computers) Computer Security Systèmes d'exploitation (Ordinateurs) Apple (Ordinateurs) Sécurité informatique operating systems Rogers, Russ MitwirkendeR ctb Ghassemlouei, Alijohn MitwirkendeR ctb 9781597499507 Erscheint auch als Druck-Ausgabe 9781597499507 |
spellingShingle | Bathurst, Robert The hacker's guide to OS X exploiting OS X from the root-up Mac OS Apple computer Computer security Operating systems (Computers) Computer Security Systèmes d'exploitation (Ordinateurs) Apple (Ordinateurs) Sécurité informatique operating systems |
title | The hacker's guide to OS X exploiting OS X from the root-up |
title_auth | The hacker's guide to OS X exploiting OS X from the root-up |
title_exact_search | The hacker's guide to OS X exploiting OS X from the root-up |
title_full | The hacker's guide to OS X exploiting OS X from the root-up Rob Bathurst, Russ Rogers, Alijohn Ghassemlouei ; Pat Engebretson, technical editor |
title_fullStr | The hacker's guide to OS X exploiting OS X from the root-up Rob Bathurst, Russ Rogers, Alijohn Ghassemlouei ; Pat Engebretson, technical editor |
title_full_unstemmed | The hacker's guide to OS X exploiting OS X from the root-up Rob Bathurst, Russ Rogers, Alijohn Ghassemlouei ; Pat Engebretson, technical editor |
title_short | The hacker's guide to OS X |
title_sort | hacker s guide to os x exploiting os x from the root up |
title_sub | exploiting OS X from the root-up |
topic | Mac OS Apple computer Computer security Operating systems (Computers) Computer Security Systèmes d'exploitation (Ordinateurs) Apple (Ordinateurs) Sécurité informatique operating systems |
topic_facet | Mac OS Apple computer Computer security Operating systems (Computers) Computer Security Systèmes d'exploitation (Ordinateurs) Apple (Ordinateurs) Sécurité informatique operating systems |
work_keys_str_mv | AT bathurstrobert thehackersguidetoosxexploitingosxfromtherootup AT rogersruss thehackersguidetoosxexploitingosxfromtherootup AT ghassemloueialijohn thehackersguidetoosxexploitingosxfromtherootup AT bathurstrobert hackersguidetoosxexploitingosxfromtherootup AT rogersruss hackersguidetoosxexploitingosxfromtherootup AT ghassemloueialijohn hackersguidetoosxexploitingosxfromtherootup |