Добро пожаловать на сайт электронной библиотеки! Здесь можно найти произведения русских и зарубежных авторов. Скачать множество книг и журналов различных жанров и направлений. Большой выбор художественной, бизнес, учебной и технической литературы. Все представленные здесь книги и журналы имеют подробное описание и обложку. Наша библиотека регулярно пополняется только новыми и интересными материалами!
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers. As a resource to the reader, the companion website will provide links from the authors, commentary and updates. It provides relevant information including some of the latest OS X threats. It is easily accessible to those without any prior OS X experience. It includes useful tips and strategies for exploiting and compromising OS X systems. It includes discussion of defensive and countermeasure applications and how to use them. It covers mobile IOS vulnerabilities.
Why You are Reading This Book? What is Contained Within the Guide? The Path Ahead
History and Introduction to OSX
History and Introduction to OSX OSX Origins Common Misconceptions Perceptions Capabilities Environments Leveraging OSX What Next?
What is a File System? The Difference Between Memory Types Partition Tables Booting Working up to HFS+ How a File System Works Disk Fragmentation The File System Forefathers HFS Plus Journaled HFS MetaData Understanding Forks Fiddling with the File System Playing with Attributes Hidden Files
Off the Client On the Client
Application and System Vulnerabilities
Understanding Vulnerabilities Vulnerabilities are Equal Opportunity History of Vulnerabilities in Apple Products Mac OS X Specific A Recent Example—Flashback Apple iOS Specific Advanced Persistent Threats Apple Script
Secure Configurations Passwords, Passphrases, and Multi-Factor Authentication Account Access Restriction FileVault Firewall Configuration Network Services Kernel Extension Removal Examining Commercial Tools PrivacyScan by SecureMac MacScan by SecureMac
The Exploits Using the Ammo in the Weapon
The Basics Coding Decompiling Journey Analysis Techniques
Apple iOS Security Model and Overview Insecurity Overview The Goods Please Don’t Hurt My Toys
Mac OS X Tips and Tricks
Web Browser Plugins Offensive Plugins Defensive Plugins Cool OS X hacks Safari Debug Mode Total Mac OS X Inversion More on ACP Applications
Название: The Hacker's Guide to OS X: Exploiting OS X from the Root Up Автор: Bathurst R., Rogers R., Ghassemlouei A. Издательство: Elsevier Год: 2013 ISBN: 1597499501 Количество страниц: 248 Формат: PDF Язык: русский Размер: 19.8 Мб
Fundamentals of Information Systems Security
Part of the New Jones & Bartlett Learning Information Systems Security & Assurance Series! Fundamentals of Information System Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in
Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
Attack and Defend Computer Security Set
Web Application Hacker's Handbook 2e. There have been two broad trends that have evolved since the first edition and will be covered in detail in this edition: Various new and modified technologies have appeared that are being used in web
Android Hacker's Handbook
The first comprehensive guide to discovering and preventing attacks on the Android OS. As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank
MIMO Wireless Communications
Multiple-input multiple-output (MIMO) technology constitutes a breakthrough in the design of wireless communications systems, and is already at the core of several wireless standards. Exploiting multipath scattering, MIMO techniques deliver
The War Within Us: Everyman's Guide to Infection and Immunity
Infectious diseases are the leading cause of death worldwide. In The War Within Us, well-known author and infectious disease specialist Cedric Mims makes the intricacies of the immune system and infectious diseases less baffling for the general
Google Hacking for Penetration Testers
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice
Hacking Exposed Wireless, 2 Edition
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition