OS X Exploits and Defense
暫譯: OS X 漏洞與防禦
Paul Baccas, Kevin Finisterre, Larry H., David Harley, Gary Porteus, Chris Hurley, Johnny Long
- 出版商: Syngress Media
- 出版日期: 2008-02-01
- 定價: $1,980
- 售價: 5.0 折 $990
- 語言: 英文
- 頁數: 352
- 裝訂: Paperback
- ISBN: 159749254X
- ISBN-13: 9781597492546
-
相關分類:
MAC OS 蘋果電腦、Operating-system、資訊安全
立即出貨 (庫存 < 4)
買這商品的人也買了...
-
$680$537 -
$450$356 -
$780$616 -
$780$741 -
$650$514 -
$880$695 -
$550$468 -
$250$165 -
$680$537 -
$520$343 -
$540$427 -
$2,240$2,128 -
$980$774 -
$1,995Handbook of Usability Testing: Howto Plan, Design, and Conduct Effective Tests, 2/e
-
$420$357 -
$680$578 -
$450$351 -
$490$387 -
$650$514 -
$580$406 -
$620$490 -
$580$458 -
$590$460 -
$720$475 -
$480$374
相關主題
商品描述
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed!
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends
商品描述(中文翻譯)
與普遍認知相反,Macintosh 相關的安全問題從未短缺。OS9 存在一些值得關注的問題。然而,由於無知和缺乏研究,許多這些問題從未被揭露。沒有發表任何穩固的技術來執行 OS9 上的任意代碼,也沒有顯著的舊版 Macintosh 漏洞利用。由於明顯漏洞和相應漏洞利用的缺乏,Macintosh 看起來是一個穩固的平台。對於 Macintosh 的 OS X 作業系統的威脅正在增加,無論是利用日益增多的漏洞、使用 rootkit 進行後期隱藏,還是擾亂服務拒絕攻擊,了解系統為何脆弱以及如何防禦是電腦安全的關鍵。
* Macintosh OS X 啟動過程與取證軟體 Mac OS X 擁有 Linux 的所有功能、所有工具和所有技術。Shell 腳本、X11 應用程式、進程、內核擴展……這是一個 UNIX 平台……現在,您可以掌握啟動過程和 Macintosh 取證軟體。
* 在洪水之前回顧,並展望 21 世紀的威脅景觀 在過去,對 Macintosh 安全的誤解幾乎是行業普遍存在的。管理員和攻擊者對這個平台都知之甚少。向 Kevin Finisterre 學習這一切是如何以及為何改變的!
* 惡意的 Mac:惡意軟體與 Mac 隨著 OS X 從桌面、筆記型電腦和伺服器進一步進入消費科技的世界(iPhone、iPod 等),這對於惡意軟體和其他安全漏洞的進一步擴散有什麼影響?向 David Harley 了解更多。
* 惡意軟體檢測與 Mac 了解為何持續堅持「這裡不會發生」的 Mac 狂熱者的聲音,可能會助長 OS X 的漏洞利用。
* Mac OS X 針對滲透測試者 憑藉其 BSD 根源、超流暢的圖形介面和近乎防彈的可靠性,Apple 的 Mac OS X 為滲透測試提供了極佳的平台。
* 使用 OS X 進行 WarDriving 和無線滲透測試 配置並利用 KisMAC WLAN 探測工具進行 WarDrive。接下來,使用在 WarDrive 中獲得的信息,成功滲透客戶的無線網絡。
* Leopard 和 Tiger 逃避技術 跟隨 Larry Hernandez 探索 OS X Tiger 和 Leopard 的利用技術、技巧和特性,使用現實場景來解釋和演示其背後的概念。
* 加密技術與 OS X Apple 從 OS9 的陰暗日子走了很長一段路。現在,Mac OS X 中有各種各樣的加密選擇。讓 Gareth Poreus 向您展示它們是什麼。
* 透過對 Mac OS X 作業系統安全漏洞的嚴肅討論,切穿炒作
* 揭示 OS X 被「擁有」的技術
* 詳細說明擊敗這些技術的程序
* 提供對新興威脅和趨勢的冷靜看法