買這商品的人也買了...
-
Computational Geometry: An Introduction Through Randomized Algorithms (Paperback)$690$676 -
深入淺出設計模式 (Head First Design Patterns)$880$695 -
SQL 語法範例辭典$550$468 -
Probability and Computing: Randomized Algorithms and Probabilistic Analysis$1,200$1,176 -
Mac OS X Internals: A Systems Approach (Hardcover)$3,300$3,135 -
Microsoft LINQ 最佳實務講座$550$435 -
深入淺出物件導向分析與設計 (Head First Object-Oriented Analysis and Design)$880$695 -
C++ Primer, 4/e (中文版)$990$891 -
LINQ 學習手冊:新一代資料查詢技術 (Introducing Microsoft LINQ)$480$379 -
Windows via C/C++, 5/e$2,540$2,413 -
Windows PowerShell 實戰手冊 (Windows PowerShell in Action)$720$569 -
大話設計模式$620$490 -
Learning jQuery 中文版 (Learning jQuery: Better Interaction Design and Web Development with Simple JavaScript Techniques)$480$379 -
走出軟體工場$380$323 -
$700Challenges for Game Designers (Paperback) -
VMware Virtual Infrastructure 及 Hyper-V R2 企業級超應用$680$578 -
Google Android SDK 開發範例大全$750$593 -
jQuery 開發實戰 (Learning jQuery 1.3)$520$411 -
UML 團隊開發流程與管理$520$411 -
SQL Server 2008 OLAP 多維度分析$680$537 -
Windows Device Driver Programming 驅動程式設計$650$553 -
ASP.NET 3.5 圖表與實務案例模組大全-使用 VC#$750$593 -
Google 應用服務引擎開發實戰$490$387 -
Silverlight 3.0 全面精通手冊─使用 VC#$650$514 -
Linux Kernel Development, 3/e (Paperback)$1,900$1,862
相關主題
商品描述
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses.
商品描述(中文翻譯)
隨著越來越多的漏洞被發現於 Mac OS X (Leopard) 作業系統,安全研究人員逐漸意識到開發這些漏洞的概念驗證攻擊的重要性。這本獨特的著作是第一本揭示 Mac OS X 作業系統缺陷的書籍——以及如何處理這些缺陷。由兩位白帽駭客撰寫,本書旨在讓重要資訊為人所知,以便您能找到保護您的 Mac OS X 系統的方法,並探討 Leopard 的安全防禦能防止哪些攻擊、哪些攻擊無法防止,以及如何最佳處理這些弱點。
