Reviews
Description
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers
As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
EXTRA 10 % discount with code: EXTRA
The promotion ends in 23d.13:28:56
The discount code is valid when purchasing from 10 €. Discounts do not stack.
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers
As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
Reviews