The Hacker's Guide to OS X: Exploiting OS X from the Root Up

  • 3h 37m
  • Alijohn Ghassemlouei, Rob Bathurst, Russ Rogers
  • Elsevier Science and Technology Books, Inc.
  • 2013
Including a discussion of defensive and countermeasure applications and how to use them, this book provides an in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers.