The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every
Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to bot
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limite
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determ
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. Whil