$54.09 (with VAT)
240.45 PLN / €51.55 / £44.75
Delivery to
check shipping prices
Product available
Delivery 2 days
Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.
OS X Exploits and Defense
1. Overview: The OS X operating system
2. Current and past threats
3. Vulnerabilities
4. Malicious Code
5. Exploit development and research
6. Rootkits
7. Defense and protection
8. Detecting malicious code; rootkits
9. Protecting against exploits
10. Locking down services and firewall policies
11. Future threats and malicious advancements facing OS X