OS X Exploits and Defense: Own it...Just Like Windows or Linux!

2008 
Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the system is vulnerable and how to defend it is critical to computer security. This book brings all this information together, providing a solid basis to help you succeed in protecting your organization from risk. * Cuts through the hype with a serious discussion of the security vulnerabilities of the Mac OS X operating system * Reveals techniques by which OS X can be "owned" * Details procedures to defeat these techniques * Offers a sober look at emerging threats and trends
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    3
    References
    0
    Citations
    NaN
    KQI
    []