Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of The hacker's guide to OS X: exploiting OS X from the root up
Bookmark Share

Text

The hacker's guide to OS X: exploiting OS X from the root up

Bathurst, Robert - Personal Name; Rogers, Russ - Personal Name; Ghassemlouei, Alijohn - Personal Name;

Table of Contents

Chapter 1. Introduction
Why You are Reading This Book?
The Path Ahead

Chapter 2. History and Introduction to OSX
History and Introduction to OSX

Chapter 3. The Filesystem
Introduction
What is a File System?
The Difference Between Memory Types
Partition Tables
Identifying GUIDs
Booting
Master Boot Records
Blessed be Thy Volume
Booting from the Network
Working up to HFS+
How a File System Works
File System Addressing
Disk Fragmentation
The File System Forefathers
File System Layouts
Hierarchical File System (circa 1985)
Microsoft File Systems
HFS Plus
Journaled HFS
MetaData
Understanding Forks
Fiddling with the File System
Playing with Attributes
Hidden Files

Chapter 4. Footprinting OSX
Introduction
Off the Client
On the Client
Conclusion

Chapter 5. Application and System Vulnerabilities
Introduction
Understanding Vulnerabilities
Vulnerabilities are Equal Opportunity
Media Layers
Host Layers
History of Vulnerabilities in Apple Products
Mac OS X Specific
A Recent Example—Flashback
How it Works
Understanding Apple’s Security Response
Apple iOS Specific
Keeping it Under Control
Advanced Persistent Threats
Apple Script

Chapter 6. Defensive Applications
Introduction
Secure Configurations
Kernel Extension Removal
Examining Commercial Tools

Chapter 7. Offensive Tactics
Introduction
Summary
References

Chapter 8. Reverse Engineering
Introduction
The Basics
Coding
Decompiling Journey
Memory Monster
Assembly Time
Ripping It Apart
Taking It Home
Analysis Techniques

Chapter 9. Mobile Platforms
Introduction
Apple iOS Security Model and Overview
References

Chapter 10. Mac OS X Tips and Tricks
Introduction
Web Browser Plugins
Cool OS X Hacks
Conclusion


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.84 BAT h
b0001390
Available - Available
Detail Information
Series Title
--
Call Number
005.84 BAT h
Publisher
Massachusetts : Syngress., 2013
Collation
x, 235 hal.; illus.; 24 cm
Language
English
ISBN/ISSN
9781597499507
Classification
005.84
Content Type
-
Media Type
-
Carrier Type
-
Edition
1st edition
Subject(s)
Computer security
Komputer -- Pengamanan
Hackers
Specific Detail Info
--
Statement of Responsibility
Robert Bathurst, Russ Rogers, and Alijohn Ghassemlouei
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?