Commencez à lire The Mac Hacker's Handbook sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil


Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

The Mac Hacker's Handbook
Agrandissez cette image

The Mac Hacker's Handbook [Format Kindle]

Charlie Miller , Dino Dai Zovi
5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)

Prix conseillé : EUR 41,20 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 45,20
Prix Kindle : EUR 20,08 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 25,12 (56%)

Applications de lecture gratuites Kindle Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 20,08  
Broché EUR 26,78  

Descriptions du produit

Présentation de l'éditeur

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses.

Quatrième de couverture

The honeymoon is over. Prepare yourself to thwart Mac attacks. Where security is concerned, Macs have long led a charmed existence. No more. If you manage security for a network that includes OS X machines, this update on the strengths and weaknesses of Mac OS X is required reading. Beginning with the core differences between Mac OS X and Windows or Linux, this book follows the steps an attacker would take. You will learn the tools needed to find vulnerabilities, the techniques used to exploit them, and the means by which attackers maintain control once they gain access. When you know how they get in, you′ll know how to keep them out. See what makes Mac OS® X unique, what security improvements were added with Leopard®, and where vulnerabilities lie Explore uncommon protocols—Bonjour®, the QuickTime® file format, and RTSP Look for bugs in Apple′s source code or use a black box technique such as fuzzing Examine stack overflow and heap overflow attacks directed at PowerPC and x86 architectures, as well as shellcodes and payloads Learn to inject code into running processes and how attackers use this technique Understand Mac OS X–specific rootkit techniques

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 4531 KB
  • Nombre de pages de l'édition imprimée : 386 pages
  • Pagination - ISBN de l'édition imprimée de référence : 0470395362
  • Editeur : Wiley; Édition : 1 (21 mars 2011)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B004U7MUMU
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)
  • Classement des meilleures ventes d'Amazon: n°214.146 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

4 étoiles
3 étoiles
2 étoiles
1 étoiles
5.0 étoiles sur 5
5.0 étoiles sur 5
Commentaires client les plus utiles
5 internautes sur 5 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 La référence actuelle sur le sujet dans le monde Mac 10 juillet 2009
Par Mic
Format:Broché|Achat vérifié
Les deux auteurs de ce livres ont plusieurs fois montrer les limites de la securite sur MacOs en gagnant différent concours(CanSecWest Pwn2Own) sur l'exploitation des failles de sécurité.
Ce livre, issu de leurs expériences, est vraiment une source de techniques, de références, de principes pour la compréhension des failles de sécurités et leurs usages possibles sur Mac (montrant au passage les limites de la sécurité sur MacOs)
Mais c'est un livre qui se mérite, en effet il est très techniques, dense et précis (mais pas confus), il demande des compétences certaines sur le systeme/processeur (assembleur, systeme ...) ou du temps pour les acquérir (on a rien sans rien). Toutefois l'approche du livre via des exemples et des explications des principes permet d'acquérir ces connaissances. Il ouvre alors les portes sur les tréfonds du système MacOs et vous permet de comprendre la subtilité de la recherche des failles de sécurité.
Donc si vous êtes intéressé par le langage machine, la maîtrise d'outils bas niveaux (Dtrace, Metasploit ...), la connaissance sur les liens entre différentes parties du système Mac (webkit, Mach ...) alors ce livre est fait pour vous.
Merci aux auteurs pour ce fantastique travail.
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur (beta) 4.3 étoiles sur 5  7 commentaires
20 internautes sur 20 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Good book but needs an update 30 octobre 2010
Par Zachary Cutlip - Publié sur
Format:Broché|Achat vérifié
The Mac Hacker's Handbook covers a lot of useful technical topics surrounding vulnerability analysis and exploit development for Mac OS X. That said, it doesn't so much teach you directly, as guide your learning. For example, it introduces the use of DTrace on OS X for dynamic analysis. It makes a very good case for DTrace's usefulness in reverse engineering, and for you to go out on your own and learn about it. Its DTrace examples aren't really freestanding, and require some background that you must get yourself. If the book were to give you the necessary background on every topic it introduces, it would be an enormous tome, and the authors probably would still be writing it.

Think of the book as explaining to you what all tools you need in your Mac hacking toolbox and why you need them, and how to put them together once you have them. It's up to you do go develop those skills on your own.

The biggest shortcoming of the book, however, is it is out of date. The concepts are sound and still very applicable, but the examples are written for OS X 10.5. Most do not work on Snow Leopard. Many you can get to work if you go out and beat the pavement trying to figure them out. I recommend this, but be aware, your progress through the book will be slow going as you get bogged down trying to figure out how to adapt each example so that it works.

This book succeeds if taken for what it is: a guide for your learning. You'll need to invest a fair amount of sweat equity to get the most out of it, though.
17 internautes sur 17 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The best Mac security reference 12 mai 2009
Par Ryan L. Russell - Publié sur
The Mac Hacker's Handbook is the best reference for Mac-specific attack information that I have found. At 368 pages, it may appear small compared to the typical 750+ page security tome. That's because the authors have done a near-perfect job of sticking to the topic at hand, the Mac. The authors do not succumb to the usual temptation to try and teach assembly language or reverse engineering. Rather, they do an excellent job touching on those topics in an OS X context, and assume the reader has a little background in that area already, or can otherwise keep up. I have done some limited research into the areas of Mac malware and process injection in the past. This book has done a fantastic job of filling in many holes in my knowledge that I hadn't been able to take care of before. Plus, it introduced me to a number of Mac-specific security features I wasn't aware of before. Highly recommended for anyone interested in Mac security.
7 internautes sur 8 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Breaks new ground into the Mac 7 mai 2009
Par mjw - Publié sur
As a security professional Mac's are an interesting subject. They combine many of the best features from other operating systems into a wonderful package. I purchased a Macbook during a pen test about 8 months ago and have been in love with it since then. Before this book looking at security on Apple products was a difficult dive into the unknown. Charlie and Dino have done a lot of hard work and figured out the internals of OS X as related to security. They clearly present what's going inside the OS and how they learned the internals. This enables other security professionals to follow their method to both gain better understanding and to know what's wrong when something inevitably changes.

I'd definitely recommend this book for experienced security professionals looking to do exploit development on the Mac.
2 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Technical and detailed 27 janvier 2012
Par Prime - Publié sur
Format:Broché|Achat vérifié
This book provides insight into many applications and internals of Apple's Mac operating system from a security perspective, which was exactly what I was looking for. A great read at home or on the plane, it keeps you interested with detailed accounts of bugs found on this platform. It goes into detail on how the vulnerabilities occur and even how to exploit them. The authors are world class guys. Highly recommended.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great Book 22 février 2011
Par J. Carlson - Publié sur
Format:Broché|Achat vérifié
I really enjoyed this book, it teaches a number of techniques and does a great explaining the motivation behind an attack. I really enjoyed the chapters on dtrace and rootkits, as dtrace allowed me a quick way to peer inside what sys calls are made and the rootkits were discussed very well. While yes, a number of examples are out of date due to Snow Leopard, you can contact the authors, who are very friendly and happy to share some of their public slides, as well as trying to use the ideas to foster your own techniques.

Overall, a great book for anyone interested in hacking, Mac OS X, or both. Of course, if you're into iPhone hacking, this is a good place to start as well, and the authors know a thing or two there as well...
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Première publication:
Aller s'identifier

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon

Rechercher des articles similaires par rubrique