版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.youkuaiyun.com/topmvp - topmvp
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends
http://rapidshare.com/files/138139657/159749254X.rar
http://depositfiles.com/files/7301256
Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the system is vulnerable and how to defend it is critical to computer security. This book brings all this information together, providing a solid basis to help you succeed in protecting your organization from risk.
* Cuts through the hype with a serious discussion of the securityvulnerabilities of the Mac OS X operating system* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends
http://rapidshare.com/files/138139657/159749254X.rar
http://depositfiles.com/files/7301256
本书深入探讨了 Mac OS X 操作系统的安全漏洞,并揭示了如何让该系统被完全控制的技术手段。此外,还详细介绍了防御这些攻击的方法,帮助读者了解新兴威胁及趋势。
1万+

被折叠的 条评论
为什么被折叠?



