Nehodí se? Vůbec nevadí! U nás můžete do 30 dní vrátit
S dárkovým poukazem nešlápnete vedle. Obdarovaný si za dárkový poukaz může vybrat cokoliv z naší nabídky.
30 dní na vrácení zboží
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers. As a resource to the reader, the companion website will provide links from the authors, commentary and updates. It provides relevant information including some of the latest OS X threats. It is easily accessible to those without any prior OS X experience. It includes useful tips and strategies for exploiting and compromising OS X systems. It includes discussion of defensive and countermeasure applications and how to use them. It covers mobile IOS vulnerabilities.