OS X Exploits and Defense

OS X Exploits and Defense

Author:
Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.
240.45 zł
Publishing date:
Delivery:
Publisher:
Number of pages:
352
Publication form:
Language:
Edition:
ISBN:
9781597492546
Categories:
Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.

1. Overview: The OS X operating system 2. Current and past threats 3. Vulnerabilities 4. Malicious Code 5. Exploit development and research 6. Rootkits 7. Defense and protection 8. Detecting malicious code; rootkits 9. Protecting against exploits 10. Locking down services and firewall policies 11. Future threats and malicious advancements facing OS X