The Hacker's Guide to OS X: Exploiting OS X from the Root Up
Robert Bathurst (Cyber Security Researcher and Penetration Tester),Russ Rogers (Penetration Tester for a Federal Agency and Co-founder/Chief Executive Officer, Peak Security, Inc.),Alijohn Ghassemlouei (Cyber Security Specialist and Certified Ethical Hacker)
The Hacker’s Guide to OS X: Exploiting OS X from the Root Up
Robert Bathurst (Cyber Security Researcher and Penetration Tester),Russ Rogers (Penetration Tester for a Federal Agency and Co-founder/Chief Executive Officer, Peak Security, Inc.),Alijohn Ghassemlouei (Cyber Security Specialist and Certified Ethical Hacker)
of ISO 17020, ISO 17025, ISO 27001 and Best Practi of ISO 17020, ISO 17025, ISO 27001 and Best Practi
This item is not currently in-stock. It can be ordered online and is expected to ship in approx 2 weeks
Our stock data is updated periodically, and availability may change throughout the day for in-demand items. Please call the relevant shop for the most current stock information. Prices are subject to change without notice.
Sign in or become a Readings Member to add this title to a wishlist.