Search

Categories

    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss

Filter By Price

$
-
$

Dietary Needs

Top Rated Product

product-img product-img

Modern Chair

$165.00
product-img product-img

Plastic Chair

$165.00
product-img product-img

Design Rooms

$165.00

Brands

  • Wooden
  • Chair
  • Modern
  • Fabric
  • Shoulder
  • Winter
  • Accessories
  • Dress

Welcome and thank you for visiting us. For any query call us on 0799 626 359 or Email [email protected]

Offcanvas Menu Open

Shopping Cart

Africa largest book store

Sub Total:

Search for any Title

OS X Exploits and Defense

By: USA) Hurley DC Washington Chris (Senior Penetration Tester (Author) , Founder of Hackers For Charity) Long Johnny (Security Researcher (Author) , AVIEN (the Anti-Virus Information Exchange Network)) Harley Independent author and consultant for Small Blue-Green World and Chief Operations Officer National Infrastructure Security Manager David (Formerly UK's National Health Service (Author)

Manufacture on Demand

Ksh 10,750.00

Format: Paperback or Softback

ISBN-13: 9781597492546

Publisher: Syngress Media,U.S.

Publication Date: Jun 5th, 2008

Dimension: 23.50 x 19.10 x 72.00 cms

Category:

Choose your Location

Shipping & Delivery

Door Delivery

Delivery fee

Delivery by 29 November when you order within the next 1 days 16 hours 2 minutes 29 seconds

  • Description

  • Reviews

Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.

Get OS X Exploits and Defense by Chris (Senior Penetration Tester, Washington, DC, USA) Hurley at the best price and quality guranteed only at Werezi Africa largest book ecommerce store. The book was published by Syngress Media,U.S. and it has pages. Enjoy Shopping Best Offers & Deals on books Online from Werezi - Receive at your doorstep - Fast Delivery - Secure mode of Payment

Customer Reviews

Based on 0 reviews

Mind, Body, & Spirit