
The Art of Mac Malware, Volume 2 Detecting Malicious Software
Macs have become a popular target of cyber-criminals, and there are few effective defences against these pernicious threats - until now. The second volume of The Art of Mac Malware is the first book to cover state-of-the-art programming techniques and security tools for detecting and countering malicious code running on a mac......
fra 629,-
Tilgjengelig i 1 butikker
Forhåndsbestill
Frakt og levering
Produktinformasjon
Macs have become a popular target of cyber-criminals, and there are few effective defences against these pernicious threats - until now. The second volume of The Art of Mac Malware is the first book to cover state-of-the-art programming techniques and security tools for detecting and countering malicious code running on a macOS system. Author Patrick Wardle, a former NSA hacker and a leading authority on macOS threat analysis, shares real-world examples from his own research to reveal the many strategies used by actual malware specimens to evade detection. As you dive deep into the Mac operating system''s internals, you''ll learn about: Apple''s public and private frameworks and APIs, How to build heuristic-based security tools for the macOS, Using the macOS Endpoint Security framework to develop real-time monitoring software , Objective-See''s suite of anti-malware tools, including KnockKnock, BlockBlock, and OverSight. But this book is not just aimed at practitioners - for anyone interested in understanding the current threats facing the Apple ecosystem, it''s a must-read.
Topplisten: Other Brand Data og informasjonsteknologi
Spesifikasjon
Produkt
| Produktnavn | The Art of Mac Malware, Volume 2 Detecting Malicious Software |
| Merke | Other Brand |
Populære produkter
Pris og prishistorikk
Akkurat nå er 629,- den billigste prisen for The Art of Mac Malware, Volume 2 Detecting Malicious Software blant 1 butikker hos Prisradar. Sjekk også vår topp 5-rangering av beste data og informasjonsteknologi for å være sikker på at du gjør det beste kjøpet.
Research design and methods : a process approachMastering United States Government Information Sources and ServicesCritical Role: Armory of HeroesCertified Ethical Hacker CEH Study Guide
Data ScienceMedical Device Cybersecurity for Engineers and Manufacturers Second EditionKubernetesEveryday Data Visualization










