Wonder Club world wonders pyramid logo
×

OS X Exploits and Defense: Own it...Just Like Windows or Linux! Book

OS X Exploits and Defense: Own it...Just Like Windows or Linux!
Be the First to Review this Item at Wonderclub
X
OS X Exploits and Defense: Own it...Just Like Windows or Linux!, Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the sy, OS X Exploits and Defense: Own it...Just Like Windows or Linux!
out of 5 stars based on 0 reviews
5
0 %
4
0 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • OS X Exploits and Defense: Own it...Just Like Windows or Linux!
  • Written by author Paul Baccas
  • Published by Elsevier Science, 4/18/2011
  • Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the sy
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Overview: The OS X operating system
Current and past threats
Vulnerabilities
Malicious Code
Exploit development and research
Rootkits
Defense and protection
Detecting malicious code; rootkits
Protecting against exploits
Locking down services and firewall policies
Future threats and malicious advancements facing OS X


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

OS X Exploits and Defense: Own it...Just Like Windows or Linux!, Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the sy, OS X Exploits and Defense: Own it...Just Like Windows or Linux!

X
WonderClub Home

This item is in your Collection

OS X Exploits and Defense: Own it...Just Like Windows or Linux!, Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the sy, OS X Exploits and Defense: Own it...Just Like Windows or Linux!

OS X Exploits and Defense: Own it...Just Like Windows or Linux!

X
WonderClub Home

This Item is in Your Inventory

OS X Exploits and Defense: Own it...Just Like Windows or Linux!, Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the sy, OS X Exploits and Defense: Own it...Just Like Windows or Linux!

OS X Exploits and Defense: Own it...Just Like Windows or Linux!

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: