El artículo ha sido añadido

The book focuses on how to find flaws in software on MacOS X and demonstrate their risk by developing proof-of-concept exploits for those vulnerabilities. The material shows what sort of attacks are prevented by Leopard's security defenses and what sort of attacks are not prevented. This information is valuable to security professionals securing MacOS X systems and applications that runon them (and by extension, the iPhone, which shares a very similar architecture). This is information that is known by ‘bad guys’ and so the ‘good guy’ authors are making sure that security professionals have access to this same information. The ideas and techniques are mostly offensive in nature.
- ISBN: 978-0-470-39536-3
- Editorial: John Wiley & Sons
- Encuadernacion: Rústica
- Páginas: 384
- Fecha Publicación: 20/02/2009
- Nº Volúmenes: 1
- Idioma: Inglés
- Inicio /
- INFORMÁTICA /
- MAC OS