Narrow your search

Library

UGent (23)

KU Leuven (21)

Odisee (21)

Thomas More Kempen (21)

Thomas More Mechelen (21)

UCLL (21)

VIVES (21)

ULiège (17)

LUCA School of Arts (12)

Vlerick Business School (11)

More...

Resource type

book (23)


Language

English (23)


Year
From To Submit

2023 (2)

2021 (2)

2020 (1)

2018 (1)

2016 (6)

More...
Listing 1 - 10 of 23 << page
of 3
>>
Sort by

Book
Snow leopards
Authors: --- ---
ISBN: 0128024968 0128022132 9780128024966 9780128024966 9780128022139 Year: 2016 Publisher: London, United Kingdom

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The hacker's guide to OS X : exploiting OS X from the root up
Authors: --- --- ---
ISBN: 1283852268 1597499544 1597499501 9781597499507 Year: 2013 Publisher: Waltham, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates.


Book
Thor's OS Xodus : why and how I left Windows for OS X
Authors: --- --- ---
ISBN: 0124105068 0124104630 9780124105065 9780124104631 Year: 2016 Publisher: Amsterdam, [Netherlands] : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix. Provides the best way to migrate from Microsoft products to OSX with information found in no other text The most complete roadmap for entities who want to move away from Microsoft and decouple their dependency on Microsoft products Authored by Thor Mullen, Principal Security Architect for a multi-billion dollar commerce platform, who teaches users how to create a secure OSX installation Unique resource that provides valuable information on moving from IIS to Apache, from MS SQL Server to MySQL, from .NET to PHP

Programming with Quartz
Authors: ---
ISBN: 1280633514 9786610633517 0080459633 0123694736 9780080459639 9780123694737 9781280633515 6610633517 Year: 2006 Publisher: Amsterdam Boston Elsevier Morgan Kaufmann

Loading...
Export citation

Choose an application

Bookmark

Abstract

Written by members of the development team at Apple, Programming with Quartz is the first book to describe the sophisticated graphics system of Mac OS X. By using the methods described in this book, developers will be able to fully exploit the state-of-the-art graphics capabilities of Mac OS X in their applications, whether for Cocoa or Carbon development. This book also serves as an introduction to 2D graphics concepts, including how images are drawn and how color is rendered. It includes guidance for working with PDF documents, drawing bitmap graphics, using Quartz built-in color mana

Mac OS X developer's guide
Author:
ISBN: 1281046450 9786611046453 0080510523 012251341X 9780080510521 9780122513411 Year: 2002 Publisher: San Diego, CA : London : Morgan kaufmann,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Mac OS X, Apple's newest operating system for the Macintosh platform, is profoundly different from its earlier versions because of its similarity to the UNIX operating system. For developers writing software for OS X this means adjusting to two new environments to create applications and to access the enhanced features of the new OS, Cocoa and Carbon. Cocoa is an object-oriented API in which all future OS X programs will be written. Carbon is a transitional technology allowing compatibility of applications written for earlier versions of the Mac OS with Mac OS X.Mac OS X Developer's Gu


Book
Apple Device Management : A Unified Theory of Managing Macs, iPads, iPhones, and AppleTVs
Authors: ---
ISBN: 1484253884 1484253876 Year: 2020 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away. You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that’s necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts. With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they’re completely secure. You’ll also work on getting standard QA environments built out, so you can test more effectively with less effort. Apple is forging their own path in IT. They trade spots with Amazon, Google, and Microsoft as the wealthiest company to ever exist. And they will not be constrained by 30 or more years of dogma in the IT industry. You can try to shoehorn Apple devices into outdated modes of device management, or you can embrace Apple’s stance on management with the help of this book. .


Book
Tweak your Mac terminal : command line MacOS
Author:
ISBN: 1484261712 1484261704 Year: 2021 Publisher: [Place of publication not identified] : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Look beyond the basics of Mac programming and development to become a Mac power user. When most people think about the Mac, they think about the amazing graphical user interface macOS is known for. However, there is a whole world to explore beneath the hood. This book approaches working directly in the terminal with fun projects and ideas to help turn you into an advanced Mac user. You'll work with Brew (HomeBrew), which gives you the ability to install applications from Linux (and Unix) that can make the terminal more useful. This is important, because a lot of applications have been stripped out of macOS or deprecated. For example, Apple's built-in PHP is usually a major release behind. You'll also customize your terminal to change everything about it, making it your own. The whole world is about personalizing. Why put up with the Apple defaults? Once you have your terminal set up and ready to rock, you'll review the basics of programming on the Mac terminal. This will allow you to get a taste of power scripting. You'll discover the power of bash, PHP, and Python. And then you'll apply those tools to web development. Tweak Your Mac Terminal takes you on a journey into a world of the terminal and its hidden applications. You will: Customize the terminal to make it perfect for your needs Develop web applications using basic coding skills in the terminal Install HomeBrew and by extension Linux and Unix applications.


Book
MacOS daemonology : communicate with daemons, agents, and helpers through XPC
Author:
ISBN: 1484272773 1484272765 Year: 2021 Publisher: [Place of publication not identified] : Apress,


Book
Apple Device Management : A Unified Theory of Managing Macs, IPads, IPhones, and Apple TVs
Authors: ---
ISBN: 1484291565 1484291557 Year: 2023 Publisher: New York, NY : Apress Media LLC,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away. You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that’s necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts. With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they’re completely secure. You’ll also work on getting standard QA environments built out, so you can test more effectively with less effort. Apple is forging their own path in IT. They trade spots with Amazon, Google, and Microsoft as the wealthiest company to ever exist. And they will not be constrained by 30 or more years of dogma in the IT industry. You can try to shoehorn Apple devices into outdated modes of device management, or you can embrace Apple’s stance on management with the help of this book. .


Book
OS X exploits and defense
Authors: --- ---
ISBN: 1281309125 9786611309121 0080558763 159749254X 9781597492546 9780080558769 Year: 2008 Publisher: Burlington, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the system is vulnerable and how to defend it is critical to computer security. This book brings all this information together, providing a solid basis to help you succeed in protecting your organization from risk.* Cuts through the hype with a serious discussion of the security vulnerabilities of the Mac OS X operating system* Reve

Listing 1 - 10 of 23 << page
of 3
>>
Sort by