The Mac Hacker's Handbook

The Mac Hacker's Handbook pdf epub mobi txt 電子書 下載2025

出版者:Wiley
作者:Charlie Miller
出品人:
頁數:384
译者:
出版時間:2009-3-3
價格:USD 49.99
裝幀:Paperback
isbn號碼:9780470395363
叢書系列:
圖書標籤:
  • MacOSX 
  • 安全 
  • 計算機 
  • hack 
  • 滲透測試 
  • 第一梯隊 
  • RE 
  • Programming 
  •  
想要找書就要到 圖書目錄大全
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses.

具體描述

讀後感

評分

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the fla...

評分

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the fla...

評分

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the fla...

評分

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the fla...

評分

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the fla...

用戶評價

评分

可惜是以10.4.×的Mac OS X為實驗平颱的,但是作者提供瞭一些挖洞的思路

评分

安全技術革新很快,書裏的內容早就過時瞭。不過還算是介紹瞭一些基本的概念。

评分

可惜是以10.4.×的Mac OS X為實驗平颱的,但是作者提供瞭一些挖洞的思路

评分

可惜是以10.4.×的Mac OS X為實驗平颱的,但是作者提供瞭一些挖洞的思路

评分

可惜是以10.4.×的Mac OS X為實驗平颱的,但是作者提供瞭一些挖洞的思路

本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

© 2025 qciss.net All Rights Reserved. 小哈圖書下載中心 版权所有