O'Reilly logo

The Hacker's Guide to OS X by Alijohn Ghassemlouei, Russ Rogers, Robert Bathurst

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Application and System Vulnerabilities

Information in this chapter:

ent Introduction

ent Understanding Vulnerabilities

ent History of Vulnerabilities in Apple Products

ent Conclusion

Introduction

Up to this point in the book, we’ve looked at many different specifics of the Mac OS X operating system, including the history and some core features of the OS. Each ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required