Chapter 5

Application and System Vulnerabilities

Information in this chapter:

ent Introduction

ent Understanding Vulnerabilities

ent History of Vulnerabilities in Apple Products

ent Conclusion

Introduction

Up to this point in the book, we’ve looked at many different specifics of the Mac OS X operating system, including the history and some core features of the OS. Each ...

Get The Hacker's Guide to OS X now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.