Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

OS X Exploits and Defense

Own it...Just Like Windows or Linux!
 Web PDF
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780080558769
Veröffentl:
2011
Einband:
Web PDF
Seiten:
352
Autor:
Paul Baccas
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
2 - DRM Adobe
Sprache:
Englisch
Beschreibung:

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
1. Overview: The OS X operating system2. Current and past threats3. Vulnerabilities4. Malicious Code5. Exploit development and research6. Rootkits7. Defense and protection8. Detecting malicious code; rootkits9. Protecting against exploits10. Locking down services and firewall policies11. Future threats and malicious advancements facing OS X

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga