Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Hi-index | 0.00 |
Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the system is vulnerable and how to defend it is critical to computer security. This book brings all this information together, providing a solid basis to help you succeed in protecting your organization from risk.* Cuts through the hype with a serious discussion of the security vulnerabilities of the Mac OS X operating system* Reveals techniques by which OS X can be "owned"* Details procedures to defeat these techniques* Offers a sober look at emerging threats and trends