Sold Out
Book Categories |
Overview: The OS X operating system
Current and past threats
Vulnerabilities
Malicious Code
Exploit development and research
Rootkits
Defense and protection
Detecting malicious code; rootkits
Protecting against exploits
Locking down services and firewall policies
Future threats and malicious advancements facing OS X
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionOS X Exploits and Defense: Own it...Just Like Windows or Linux!
X
This Item is in Your InventoryOS X Exploits and Defense: Own it...Just Like Windows or Linux!
X
You must be logged in to review the productsX
X
X
Add OS X Exploits and Defense: Own it...Just Like Windows or Linux!, Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the sy, OS X Exploits and Defense: Own it...Just Like Windows or Linux! to the inventory that you are selling on WonderClubX
X
Add OS X Exploits and Defense: Own it...Just Like Windows or Linux!, Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the sy, OS X Exploits and Defense: Own it...Just Like Windows or Linux! to your collection on WonderClub |