The Mac Hacker's Handbook

· John Wiley & Sons
4.2
6 ግምገማዎች
ኢ-መጽሐፍ
384
ገጾች
የተሰጡት ደረጃዎች እና ግምገማዎች የተረጋገጡ አይደሉም  የበለጠ ለመረዳት

ስለዚህ ኢ-መጽሐፍ

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses.

ደረጃዎች እና ግምገማዎች

4.2
6 ግምገማዎች

ስለደራሲው

CharlIe Millerwon the second CanSecWest Pwn2Own contest in 2008 and was named one of the Top 10 Computer Hackers of 2008 by Popular Mechanics.

Dino Dai Zovi won the first CanSecWest Pwn2Own contest in 2007 and was named one of the 15 Most Influential People in Security by eWEEK.

ለዚህ ኢ-መጽሐፍ ደረጃ ይስጡ

ምን እንደሚያስቡ ይንገሩን።

የንባብ መረጃ

ዘመናዊ ስልኮች እና ጡባዊዎች
የGoogle Play መጽሐፍት መተግበሪያውንAndroid እና iPad/iPhone ያውርዱ። ከእርስዎ መለያ ጋር በራስሰር ይመሳሰላል እና ባሉበት የትም ቦታ በመስመር ላይ እና ከመስመር ውጭ እንዲያነቡ ያስችልዎታል።
ላፕቶፖች እና ኮምፒውተሮች
የኮምፒውተርዎን ድር አሳሽ ተጠቅመው በGoogle Play ላይ የተገዙ ኦዲዮ መጽሐፍትን ማዳመጥ ይችላሉ።
ኢሪደሮች እና ሌሎች መሳሪያዎች
እንደ Kobo ኢ-አንባቢዎች ባሉ ኢ-ቀለም መሣሪያዎች ላይ ለማንበብ ፋይል አውርደው ወደ መሣሪያዎ ማስተላለፍ ይኖርብዎታል። ፋይሎቹን ወደሚደገፉ ኢ-አንባቢዎች ለማስተላለፍ ዝርዝር የእገዛ ማዕከል መመሪያዎቹን ይከተሉ።