Dimensions
189 x 232 x 23mm
The book focuses on how to find flaws in software on MacOS X and demonstrate their risk by developing proof-of-concept exploits for those vulnerabilities. The material shows what sort of attacks are prevented by Leopard's security defenses and what sort of attacks are not prevented. This information is valuable to security professionals securing MacOS X systems and applications that run on them (and by extension, the iPhone, which shares a very similar architecture). This is information that is known by "bad guys" and so the "good guy" authors are making sure that security professionals have access to this same information. The ideas and techniques are mostly offensive in nature.