![cover image of The Hacker's Guide to OS X](https://img1.od-cdn.com/ImageType-400/1706-1/4D7/033/D8/{4D7033D8-6CA3-4824-8219-B2A20975EB07}Img400.jpg)
Sign up to save your library
With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.
Find this title in Libby, the library reading app by OverDrive.
![LibbyDevices.png](https://images.contentstack.io/v3/assets/blt3d151d94546d0edd/blt96637953bca8f11b/642dbad30afb1c108e793645/LibbyDevices.png)
Search for a digital library with this title
Title found at these libraries:
Loading... |
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers
As a resource to the reader, the companion website will provide links from the authors, commentary and updates.