Deliver to Romania
IFor best experience Get the App
Full description not available
I**N
One of the most useful references
I'm a Threat Researcher just starting to focus on macOS. I was on the fence considering the purchase price. After a few weeks with it in hand I can say it was worth the money. It covers exactly what I'm looking for with great explanation. I would think a beginner can take any one of these volumes and move through it.100% recommended.
R**E
Terrific, an absolute must have on your shelf!
I thoroughly enjoyed this book! Have been re-reading chapters multiple times and it is a wonderful companion to my own research.This particular volume (vol 3, which is the first released of the three vols ) talks about security mechanisms in apple's OSes in enchanting technical detail in the first part and then jumps into discussing actual vulnerabilities and exploits to defeat these mechanisms. A particular highlight worth mentioning would be the chapters related to Jailbreaking (almost half the book!) which are an absolute delight. The chapters are comprehensive while also having an engaging technical depth.Overall, one of the very best books out there for macOS/iOS internals and it can serve almost any purpose- as a companion , a reference, a massive encyclopedia and even a work-along-exercises-as you read book.Eagerly waiting for the other two volumes !
K**E
Great book, extremely detailed
Great book, much more his own individual style than his previous Mac and iOS book, written like he speaks.I've read a couple dozen infosec books but I think this is the most detailed book and might be the hardest to read (excluding crypto/math/program analysis books.) 1200 pages of TAOSSA didn't take as long to read as this book.I started reading it from the first page, but after a few chapters I skipped straight to Part 2, the jailbreaks. Finally a book covering advanced, P0 level, exploitation! I found the write ups easier to digest, then returned to Part 1.Jonathan was extremely nice to write hand written notes to many early book recipients. I took his course and recommend it.
R**N
I also like the printing and format of the book
A definite must-read for anybody interested in the inner workings of macOS, iOS and *OS. This volume focuses on the security components of *OS in-depth, to a level not available anywhere else. If you want to know how various *OS background services are implemented, grab a cup of a coffee and dig in.I also like the printing and format of the book. Too many times these days reference books hard to read. This book is large, sturdy and feels like a college textbook that I'd want to keep around.
J**N
If you wanna do anything serious in iOS Hacking without losing your mind, you need this book.
Jonathan probably doesn't realize the bigger picture yet but his *OS Internals books are actively forming even as we speak new generations of iOS/macOS hackers & security enthusiasts. Many of the best security researchers in the community have read at least his first book (now free), with many having the new volumes too. There’s no other work which explains iOS and macOS better so I think this book has quickly become the de facto bible of any *OS hacker that’s serious about this path. Lots of details you would never get to know without reading this. The amount of work that has been put in this book is visible from miles away and it really doesn't leave anything unapproached. There are many resources a security researcher can use to get started with iOS and macOS hacking and internals, but many of them are outdated beyond imagination with Apple changing stuff almost on daily basis, trust me, I searched. There is no other similar work so detailed, so well put together.My only complaint: This DOES have some issues with international shipping (Amazon-related). If Amazon refuses to ship to your place, use a forwarder service. That's how I got my copy (or contact Jonathan directly).
J**M
Amazingly thorough masterpiece.
Amazingly thorough masterpiece. All his books are priceless thick wonders, jam packed with accurate internals details. the covers need lifetime protection but can be enhanced with contact paper and cardboard and sleeves. Plus .. you should not let others borrow these irreplaceable masterpieces anyways.IT CAME FAR SOONER THAN I EVER EXPECTED
A**R
Jonathan Levin's books are some of the biblical reference texts ...
Jonathan Levin's books are some of the biblical reference texts to study for those embarking on hacking the XNU kernel. It contains unabashedly technical details to entertain and explain core concepts on Apple and xnu's security mechanisms. If you have ever wondered how some of the most obscure features of Apples crown jewels works then these texts by Jonathan Levin should be on the top of your list.
S**H
Great knowledge
Great book and a ton of good information. I was just bummed at the condition of the book when it arrived. Cover page and first few pages were bent pretty badly, binding was really worn. Excellent knowledge in the book, hence the 5-stars. Just wish it showed up in better condition.
Trustpilot
2 days ago
3 days ago