Academic literature on the topic 'Macos'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Macos.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Macos"

1

Stecher, Glen, Koichiro Tamura, and Sudhir Kumar. "Molecular Evolutionary Genetics Analysis (MEGA) for macOS." Molecular Biology and Evolution 37, no. 4 (January 6, 2020): 1237–39. http://dx.doi.org/10.1093/molbev/msz312.

Full text
Abstract:
Abstract The Molecular Evolutionary Genetics Analysis (MEGA) software enables comparative analysis of molecular sequences in phylogenetics and evolutionary medicine. Here, we introduce the macOS version of the MEGA software. This new version eliminates the need for virtualization and emulation programs previously required to use MEGA on Apple computers. MEGA for macOS utilizes memory and computing resources efficiently for conducting evolutionary analyses on macOS. It has a native Cocoa graphical user interface that is programmed to provide a consistent user experience across macOS, Windows, and Linux. MEGA for macOS is available from www.megasoftware.net free of charge.
APA, Harvard, Vancouver, ISO, and other styles
2

Wolcott, Harry F. "The Middlemen of MACOS." Anthropology & Education Quarterly 38, no. 2 (June 2007): 195–206. http://dx.doi.org/10.1525/aeq.2007.38.2.195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Manna, Modhuparna, Andrew Case, Aisha Ali-Gombe, and Golden G. Richard. "Modern macOS userland runtime analysis." Forensic Science International: Digital Investigation 38 (September 2021): 301221. http://dx.doi.org/10.1016/j.fsidi.2021.301221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Case, Andrew, Ryan D. Maggio, Modhuparna Manna, and Golden G. Richard. "Memory Analysis of macOS Page Queues." Forensic Science International: Digital Investigation 33 (July 2020): 301004. http://dx.doi.org/10.1016/j.fsidi.2020.301004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hwa Song, Jong, Se Ho Kim, Song Yi Hwang, Seung Gyu Kim, and Sung Jin Lee. "A study on the APFS timestamps in MACOS." International Journal of Engineering & Technology 7, no. 3.3 (June 8, 2018): 133. http://dx.doi.org/10.14419/ijet.v7i2.33.13870.

Full text
Abstract:
Background/Objectives: There are not many time analysis studies on High Sierra, the latest macOS (10.13) that has changed the file system from HFS+ toAPFS (Apple File System).Methods/Statistical analysis: In this experiment, we tried various actions of the file and the directory with using the Sierra version of the internal drive and the High Sierra version of the external drive. The ‘mdls’ command and the time attributes of the Finder are used for comparing the metadata.The ‘log show’ command is also used for checking the system time modification. For analyzing the .DS_Store and the db.sqlite files, we used .DS_Store Parser and DB Browser for SQLite.Findings: First of all, we briefly review time synchronization and APFS. And then, we compare the time records of HFS+ with those of APFS with differences. The unified logging file (tracev3) file with using the ‘log show’ command is analyzed and it is confirmed that the relevant log is left when the system time is changed. Next, we performed various actions on the files and directories of Sierra and High Sierra, and compiled the results as the tables. As a result, we found that the accessed time values were not updated well at high Sierra for the performance purpose. Finally, we also found the file attribute values in the DS_Store file in the RecycleBin and the database files in Document Revisions by default, and found that they can be used in forensic analysis.Improvements/Applications: Furthermore, it is necessary to examine and analyze the change of the time attribute of the file when the file and folder are moved or copied with APFS formatted external storage device.
APA, Harvard, Vancouver, ISO, and other styles
6

Alcazar, Jesus, and Juan de M. Munoz. "ChemInform Abstract: Microwave-Assisted Continuous Flow Organic Synthesis (MACOS)." ChemInform 44, no. 32 (July 18, 2013): no. http://dx.doi.org/10.1002/chin.201332267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Johannsen, Jens. "OSC Deck 2 and 8-Track Tool for MacOS-Compatible Computers." Computer Music Journal 19, no. 3 (1995): 68. http://dx.doi.org/10.2307/3680661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Arroyo Ohori, Ken. "azul: A fast and efficient 3D city model viewer for macOS." Transactions in GIS 24, no. 5 (August 2, 2020): 1165–84. http://dx.doi.org/10.1111/tgis.12673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Langner, Michael, and Stefan Mulitza. "Technical note: PaleoDataView – a software toolbox for the collection, homogenization and visualization of marine proxy data." Climate of the Past 15, no. 6 (December 19, 2019): 2067–72. http://dx.doi.org/10.5194/cp-15-2067-2019.

Full text
Abstract:
Abstract. We present a software toolbox that allows the efficient collection, management and maintenance of larger paleoceanographic data sets. The program combines a graphical user interface (GUI) with a simple document-based database and functionality for visualization, stratigraphy (visual alignment and radiocarbon calibration), age modelling and efficient ensemble time-series generation to create larger homogenous data compilations. Data can be imported from Excel or text files, are stored locally in netCDF format and can be easily exchanged between collaborating scientists. Within a data collection, data can be imported either to proxy-specific sub-collections or to a multi-proxy (“miscellaneous”) sub-collection that allows the import and management of any downcore data. A single age model is shared among all proxies of a core within a collection. The stand-alone software can be used with Windows and macOS and does not require web access. Installers of the current version for both Windows 10 and macOS including the C++ code can be downloaded from https://www.marum.de/Stefan-Mulitza/PaleoDataView.html (last access: 5 December 2019) along with a detailed user guide.
APA, Harvard, Vancouver, ISO, and other styles
10

Miller, Barton P., Gregory Cooksey, and Fredrick Moore. "An empirical study of the robustness of MacOS applications using random testing." ACM SIGOPS Operating Systems Review 41, no. 1 (January 2007): 78–86. http://dx.doi.org/10.1145/1228291.1228308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Macos"

1

Ševčík, Ondřej. "Nástroj pro správu souborů v systému MacOS/X." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2007. http://www.nusl.cz/ntk/nusl-412778.

Full text
Abstract:
This MSc Thesis presents history of Apple's operating system and developing application for Mac OS X. First part introduces long evolution of macintosh's OS since early beginings in 1976 focused on latest Mac OS X. Second part makes reader acquainted with elements of creating applications for Mac OS X using Cocoa framework and Objective-C language which is real objective superset of well known C language. Practical part is developing file manager. Programming patterns from file manager are used for explaining fundamentals of developing. This contains exact directions how to create first application step by step.
APA, Harvard, Vancouver, ISO, and other styles
2

Chevez, Marañón Luis Felipe, and Esquén Maria Ysabel Ramos. "Mentoring en el uso de la Imac." Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/624115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Вачнадзе, А. М. О. "Розробка FPS гри на ігровому рушії Unity." Thesis, Чернігів, 2020. http://ir.stu.cn.ua/123456789/23439.

Full text
Abstract:
Вачнадзе, А.-М. О. Розробка FPS гри на ігровому рушії Unity : випускна кваліфікаційна робота : 123 "Комп’ютерна інженерія" / А.-М. О. Вачнадзе ; керівник роботи С. В. Зайцев ; НУ "Чернігівська політехніка", кафедра інформаційних та комп’ютерних систем. – Чернігів, 2020. – 100 с.
Об’єкт дослідження – процес створення гри на безкоштовному рушії гри. Предмет дослідження є гра для операційної системи Windows. Гра була розроблена за допомогою ігрового рушія Unity, який працює на таких платформах як Windows, Linux, MacOS. Unity - зручний і практичний інструмент для розробки комп’ютерних, мобільних ігор і т.д. Окрім цього він став популярним інструментом серед кіно-та автоіндустрії. Мета дослідження: - ознайомлення з інструментом розробки комп’ютерних, мобільних та інших додатків Unity; - розробка десктопної гри для операційної системи Windows; - продемонструвати можливості та доступність рушія гри Unity. За останні 20 років ігрова індустрія стала доволі великою, впливовою та фінансово вигідною. Збільшилася кількість пристроїв на яких можливо запустити ігри: комп’ютери, ноутбуки, смартфони, планшети, звичайні та портативні ігрові консолі. З часом стали доступні різні ігрові рушії, завдяки яким будь-хто міг створювати ігри самостійно, оскільки раніше розробникам доводилося власноруч створювати інструменти для розробки ігор. Серед таких рушіїв був Unity, за допомогою якого була створена дана кваліфікаційна робота.
The topic of the qualification work is development of FPS game on the Unity game engine. The object of research is the process of creating a game on a free game engine. The subject of the study is a game for the Windows operating system. The game was developed by using Unity game engine, which runs on platforms such as Windows, Linux, MacOS. Unity is a convenient and practical tool for developing computer and mobile games, etc. In addition, it has become a popular tool among the film and automotive industries. The purpose of the study: - introduction to the tool for developing computer, mobile and other Unity applications; - development of a desktop game for the Windows operating system; - demonstrate the capabilities and availability of the Unity game engine. Over the last 20 years, the gaming industry has become quite large, influential and financially profitable. The number of devices that can run games has increased: computers, laptops, smartphones, tablets, regular and portable game consoles. Over time, various game engines became available, thanks to which anyone could create games on their own, as previously developers had to create their own tools for creating games. Among such engines was Unity, with the help of which this qualifying work was created.
APA, Harvard, Vancouver, ISO, and other styles
4

Zuzelka, Jozef. "Řízení externích zařízení na macOS s cílem zabránit úniku dat." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417224.

Full text
Abstract:
Práca sa zaoberá problematikou kontroly a blokovania externých zariadení v operačnom systéme Apple macOS za účelom ochrany pred únikom citlivých dát. Implementované riešenie ukazuje zvolené prístupy pre blokovanie externých a cloudových diskov. Pre blokovanie USB diskov bol použitý DiskAbitration framework, čo je najvodnejšie riešenie tohto typu úlohy. Avšak cloudové disky sú v skutočnosti synchronizované zložky a úlohu nehrajú ovládače ani strom pripojených zariadení. Ku kontrole operácií v cloudových diskoch bol použitý Endpoint Security framework. Aktuálne podporovaní cloudový poskytovatelia sú iCloud a Dropbox a prístup k nim môže byť obmedzený úplne alebo iba na čítanie. Schopnosť synchronizácie vzdialenýh zmien bola zachovaná avšak v prípade Dropboxu si to žiada nepoužívať ich aplikáciu na správu súborov.
APA, Harvard, Vancouver, ISO, and other styles
5

Světlík, Martin. "Integrace počítačů Apple Mac do firemního prostředí." Master's thesis, Vysoká škola ekonomická v Praze, 2016. http://www.nusl.cz/ntk/nusl-261954.

Full text
Abstract:
Corporate informatics has undergone a number of changes in past few years. Used devices are becoming more independent from the OS, they rely more on provided services and the level of security. Cloud technologies are increasingly growing in significance and a large number of companies offer their employees BYOD (Bring Your Own Device). This thesis focuses on integration of Apple Mac computers into corporate environments, based on analysis of contemporary approaches and possibilities of dealing with integration. An important part of this thesis is research of chosen implemented solutions in the Czech republic. From both parts of this thesis it then offers recommendations, which are based on practical experience of companies that widely use and deal with integration of Mac computers.
APA, Harvard, Vancouver, ISO, and other styles
6

Вачнадзе, А. М. О. "Розробка багатокористувацької FPS гри на ігровому рушії UNITY." Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/24993.

Full text
Abstract:
Вачнадзе, А.-М. О. Розробка багатокористувацької FPS гри на ігровому рушії UNITY : випускна кваліфікаційна робота : 123 "Комп’ютерна інженерія" / А.-М. О. Вачнадзе ; керівник роботи С. В. Зайцев ; НУ "Чернігівська політехніка", кафедра інформаційних та комп’ютерних систем. – Чернігів, 2021. – 63 с.
Тема кваліфікаційної роботи – розробка багатокористувацької FPS гри на ігровому рушії Unity. Об’єкт дослідження – процес створення багатокористувацької гри доступними методами. Предмет дослідження є багатокористувацька гра для операційної системи Windows. Гра була розроблена за допомогою ігрового рушія Unity, який працює на таких платформах як Windows, Linux, MacOS. Unity – умовно безкоштовний інструмент для розробки комп’ютерних, мобільних ігор і т.д. Також серед користувачів можна зазначити працівників кіно-та автоіндустрії. Мета дослідження: - ознайомлення із рішенням для створення багатокористувацької гри на рушії Unity; - розробка багатокористувацької гри для операційної системи Windows; - продемонструвати функціонуючу багатокористувацьку гру. За обставин останніх двох років в багатьох людей з’явилася потреба у скоротанні вільного часу, який з’явився через перебування вдома. Як результат, кількість активних гравців збільшилася, а отже, зріс можливий прибуток для розробників. Створити багатокористувацьку гру можна на будь-якому ігровому рушії. Оскільки в попередній кваліфікаційній роботі було використано рушій гри Unity, то було прийнято рішення продовжити роботу з відомим інструментом.
The topic of the qualification work is development of a multiplayer FPS game on the Unity game engine. The object of research is the process of creating a multiplayer game with accessible solutions. The subject of the study is a multiplayer game for the Windows operating system. The game was developed by using Unity game engine, which runs on platforms such as Windows, Linux, MacOS. Unity is a shareware tool for developing computer and mobile games, etc. Also, among the users can be noted workers of the film and automotive industries. The purpose of the study: - acquaintance with the solution for creating a multiplayer game on the Unity engine; - development of multiplayer games for the Windows operating system; - demonstrate a functioning multiplayer game. Over the last 20 years, the gaming industry has become quite large, influential and financially profitable. The number of devices that can run games has increased: computers, laptops, smartphones, tablets, regular and portable game consoles. Over time, various game engines became available, thanks to which anyone could create games on their own, as previously developers had to create their own tools for creating games. Among such engines was Unity, with the help of which this qualifying work was created.
APA, Harvard, Vancouver, ISO, and other styles
7

Hovmark, Olle, and Emma Schüldt. "Towards Extending Probabilistic Attack Graphs with Forensic Evidence : An investigation of property list files in macOS." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280102.

Full text
Abstract:
Cyber-attacks against all types of systems is a growing problem in society. Since the Mac operating systems are becoming more common, so are the attacks against them. Probabilistic attack graphs are a way to model cyber- attacks. The Meta Attack Language is a language that can be used to create domain-specific languages that in turn can be used to model an attack on the specific domain with a probabilistic attack graph. This report investigates how the Meta Attack Language can be extended so that it could be used for creating attack graphs with forensic evidence, by focusing on attacks on Mac operating systems that has left evidence in the form of property list files. The MITRE ATT&CK matrix is a knowledge base with information about cyber- attacks. A study of the matrix was made to examine what evidence has been found from attacks on a Mac operating system and also to motivate why this report focuses on evidence in the form of property list files. A study on grey literature was then made to investigate different types of attacks that has left evidence in the form of property list files. The studies showed that there are a multitude of evidence that could be left from an attack on a Mac operating system and that most evidence in the form of property list files was used by the adversary as persistence mechanisms. They also showed that the property list files often were placed at root level in the file system. The studies also showed that the adversary often tried to hide the files by giving them names that are common in a Mac operating system. After the studies were conducted a list of requirements for extending the Meta Attack Language was created. This list was based on the results from the studies and included requirements that says there must be a way of expressing the name and location of the files, detection evasion methods, connections between different types of evidence or between evidence and attack steps, and more.
Cyberattacker mot alla typer av system är ett växande problem i samhället. Eftersom Mac-operativsystemen blir allt vanligare, blir attackerna mot dem också vanligare. Probabilistiska attackgrafer är ett sätt att modellera och visualisera cyberattacker. Meta Attack Language är ett språk som kan användas för att skapa domänspecifika språk som i sin tur kan användas för att modellera en cyberattack på den specifika domänen med en probabilistisk attackgraf. Denna rapport undersöker hur Meta Attack Language kan utvidgas så att det kan användas för att skapa attackgrafer som innehåller digitala forensiska bevis, genom att undersöka attacker mot Mac- operativsystem där bevis i form av property-list-filer har lämnats. MITRE ATT&CK-matrisen är en kunskapsbas med information om cyberattacker. En studie av denna matris gjordes för att ta reda på vilka olika typer av bevis som har hittats efter attacker på ett Mac-operativsystem samt för att motivera varför denna rapport fokuserar på bevis i form av property-list-filer. En studie av grå litteratur gjordes sedan för att undersöka olika typer av attacker som har lämnat bevis i form av property-list-filer. Studierna visade att det finns en mängd bevis som kan lämnas från ett angrepp på ett Mac-operativsystem och att de flesta bevis i form av property-list-filer användes av attackeraren för att göra attacken tålig mot sådant som omstart av systemet. De visade också att property-list-filerna ofta placerades i rotkatalogen i filsystemet. Studierna visade också att motståndaren ofta försökte dölja filerna genom att ge dem namn som vanligtvis används på ett Mac-operativsystem. Efter studierna genomförts skapades en lista med krav som måste uppfyllas av en utvidgning av Meta Attack. Denna lista baserades på resultaten från studierna och inkluderade krav som säger att det till exempel måste finnas sätt att uttrycka namnet och platsen för en fil, metoder som angriparen använder för att undvika upptäckt, samband mellan olika typer av bevis och samband mellan bevis och attacksteg.
APA, Harvard, Vancouver, ISO, and other styles
8

Valeriana, Riccardo. "Deep Learning: Algoritmo di Classificazione Immagini." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/17557/.

Full text
Abstract:
La presente tesi si occupa della descrizione dell’algoritmo di Deep Learning che permette la classificazione di immagini importate dal dataset CIFAR-10. Il codice è stato testato in un ambiente di test per un classificatore di immagini per piattaforme Apple macOS, dove sono state utilizzate immagini di frutta e verdura come input per la classificazione. Nel primo capitolo viene trattato il dataset CIFAR-10, come questo è stato realizzato, la sua struttura e l’uso che se ne può fare. Successivamente viene descritto il metodo di apprendimento automatico della Classificazione Lineare, in che cosa consiste, come agisce nella suddivisione di classi e quali vantaggi e svantaggi comporta. Segue l’introduzione di metodologie di apprendimento supervisionato note come macchine a vettori di supporto (SVM o Support Vector Machines) sfruttate per la classificazione di pattern e la definizione della funzione Score, che viene utilizzata per determinare la classe a cui appartiene ciascuna immagine. Nel secondo capitolo viene trattato il Deep Learning e le Reti Neurali (non convoluzionali), modello matematico basato sulla riproduzione approssimata della struttura neuronale biologica, il cervello dei mammiferi, in particolare relativamente al funzionamento della corteccia visiva. Il terzo e ultimo capitolo tratta in modo più approfondito e tecnico l’implementazione di un algoritmo di Deep Learning sviluppato in Pytorch, assieme alla libreria di Numpy, spiegando passo per passo come questo è stato strutturato. Infine viene osservato come un classificatore di immagini per piattaforme macOS opera con figure eterogenee raccolte da internet di verdure e frutti.
APA, Harvard, Vancouver, ISO, and other styles
9

Rothwell, Colin Lewis. "Exploitation from malicious PCI express peripherals." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/274352.

Full text
Abstract:
The thesis of this dissertation is that, despite widespread belief in the security community, systems are still vulnerable to attacks from malicious peripherals delivered over the PCI Express (PCIe) protocol. Malicious peripherals can be plugged directly into internal PCIe slots, or connected via an external Thunderbolt connection. To prove this thesis, we designed and built a new PCIe attack platform. We discovered that a simple platform was insufficient to carry out complex attacks, so created the first PCIe attack platform that runs a full, conventional OS. To allows us to conduct attacks against higher-level OS functionality built on PCIe, we made the attack platform emulate in detail the behaviour of an Intel 82574L Network Interface Controller (NIC), by using a device model extracted from the QEMU emulator. We discovered a number of vulnerabilities in the PCIe protocol itself, and with the way that the defence mechanisms it provides are used by modern OSs. The principal defence mechanism provided is the Input/Output Memory Management Unit (IOMMU). The remaps the address space used by peripherals in 4KiB chunks, and can prevent access to areas of address space that a peripheral should not be able to access. We found that, contrary to belief in the security community, the IOMMUs in modern systems were not designed to protect against attacks from malicious peripherals, but to allow virtual machines direct access to real hardware. We discovered that use of the IOMMU is patchy even in modern operating systems. Windows effectively does not use the IOMMU at all; macOS opens windows that are shared by all devices; Linux and FreeBSD map windows into host memory separately for each device, but only if poorly documented boot flags are used. These OSs make no effort to ensure that only data that should be visible to the devices is in the mapped windows. We created novel attacks that subverted control flow and read private data against systems running macOS, Linux and FreeBSD with the highest level of relevant protection enabled. These represent the first use of the relevant exploits in each case. In the final part of this thesis, we evaluate the suitability of a number of proposed general purpose and specific mitigations against DMA attacks, and make a number of recommendations about future directions in IOMMU software and hardware.
APA, Harvard, Vancouver, ISO, and other styles
10

Klembara, Filip. "Knihovna pro řízení datové synchronizace v prostředí aplikací Apple." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417284.

Full text
Abstract:
The goal of this thesis is to design and implement a library for data synchronization between multiple client's devices in the context of the ecosystem of a single application targeting the iOS, iPadOS or MacOS operating system. The work focuses on the simple integration of the library into existing applications using the Realm database system and on the simple way to connect the user interface with the synchronization process. I solved the chosen problem by designing a synchronization protocol primarily based on log synchronization to distribute changes between the client and the server, implementing a library to monitor changes in the client's database and distribute them to the server, and implementing a server library to integrate received changes and distribute them with help of notifications. The solution provides an easy way to implement data synchronization between multiple devices using custom database server and with the ability to define how to handle new changes of objects presented in the user interface during the synchronization. Created library can be quickly and easily integrated and thus effectively speed up the application development process.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Macos"

1

Vashurkin, Volodymyr. macOS Daemonology. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7277-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hadwen, Karl. Zsh in macOS. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6394-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dutt, Hem. Interprocess Communication with macOS. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7045-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Wallace. macOS Programming for Absolute Beginners. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2662-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McElhearn, Kirk. The MacOS X Command Line. New York: John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smith, Drew. Apple macOS and iOS System Administration. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5820-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ries, Uli. Mac OS X: Das Anwenderbuch. Poing: Franzis, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barandun, Gion Andrea. Mac OS X 10.5 - Leopard. Tamins: Pumera, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brede, Gabi. Mac OS X 10.6 Snow Leopard: Einfach, wirkungsvoll und effizient nutzen. Pfäffikon SZ: Smart Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schulz, Detlef. C-Programmierung auf dem Mac. Pfäffikon SZ: SmartBooks, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Macos"

1

Colhoun, O. "MacOS." In Springer Reference Medizin, 1556. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-48986-4_2006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Colhoun, O. "MacOS." In Lexikon der Medizinischen Laboratoriumsdiagnostik, 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-49054-9_2006-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sillmann, Thomas. "macOS – Grundlagen." In Das Swift-Handbuch, 425–500. München: Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446457300.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Drew. "macOS Security." In Apple macOS and iOS System Administration, 83–108. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5820-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smith, Drew. "macOS Server." In Apple macOS and iOS System Administration, 247–310. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5820-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vashurkin, Volodymyr. "NSXPCListenerEndpoint: XPC Service Sharing." In macOS Daemonology, 131–36. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7277-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vashurkin, Volodymyr. "Pass Objects by Copy Over XPC Using NSSecureCoding." In macOS Daemonology, 117–23. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7277-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vashurkin, Volodymyr. "Daemons at a Glance." In macOS Daemonology, 43–44. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7277-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vashurkin, Volodymyr. "Operating System Background World." In macOS Daemonology, 3–14. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7277-0_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vashurkin, Volodymyr. "User Agents." In macOS Daemonology, 83–87. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7277-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Macos"

1

Saeki, Takaya, Yuichi Nishiwaki, Takahiro Shinagawa, and Shinichi Honiden. "Bash on Ubuntu on macOS." In APSys '17: 8th Asia-Pacific Workshop on Systems. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3124680.3124733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Toldo, Davide, Jiska Classen, and Matthias Hollick. "Attaching InternalBlue to the proprietary macOS IOBluetooth framework." In WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3395351.3401697.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Yi-Hsien, Yen-Da Lin, Chung-Kuan Chen, Chin-Laung Lei, and Chun-Ying Huang. "POSTER: Construct macOS Cyber Range for Red/Blue Teams." In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3320269.3405449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Weiteng, Yu Wang, Zheng Zhang, and Zhiyun Qian. "SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers." In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3460120.3484564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Miller, Barton P., Gregory Cooksey, and Fredrick Moore. "An empirical study of the robustness of MacOS applications using random testing." In the 1st international workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1145735.1145743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Astorga, E. M. V., and Alexandre Torres Porres. "Camomile-ELSE: creating plugins with Pure Data patches and the ELSE library." In Simpósio Brasileiro de Computação Musical. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbcm.2021.19454.

Full text
Abstract:
Camomile is an open source project that turns patches made in the Pure Data programming language into plugins (VST, VST3, LV2 and Audio Unit) so you can load them in any plugin host on Windows, Linux and MacOS. We have a fork of this project that embeds the ELSE library of Pure Data externals into camomile so you dont have to only rely on the limited set of native Pure Data objects. This paper describes the potential of the Camomile project, how it makes the creation of plugins very accessible to people without a background in computer science and also how this process is improved by including the extensive ELSE library. We also offer an overview of similar projects and the technical details of including the ELSE library into the camomile project.
APA, Harvard, Vancouver, ISO, and other styles
7

Phillips, Sean, and Andrés Cabrera. "Sonification Workstation." In ICAD 2019: The 25th International Conference on Auditory Display. Newcastle upon Tyne, United Kingdom: Department of Computer and Information Sciences, Northumbria University, 2019. http://dx.doi.org/10.21785/icad2019.056.

Full text
Abstract:
Sonification Workstation is an open-source application for general sonification tasks, designed with ease-of-use and wide applicability in mind. Intended to foster adoption of sonification across disciplines, and increase experimentation with sonification by non-specialists, Sonification Workstation distills tasks useful in sonification and encapsulates them in a single software envi-ronment. The novel interface combines familiar modes of navigation from Digital Audio Workstations, with a highly simplified patcher interface for creating the sonification scheme. Further, the software associates methods of sonification with the data they sonify, in session files, which will make sharing and reproducing sonifications easier. It is posited that facilitating experimentation by non-specialists will increase the potential growth of sonification into fresh territory, encourage discussion of sonification techniques and uses, and create a larger pool of ideas to draw from in advancing the field of sonification. Source code is available at https://github.com/Cherdyakov/sonification-workstation. Binaries for macOS and Windows, as well as sample content, are available at http://sonificationworkstation.org.
APA, Harvard, Vancouver, ISO, and other styles
8

Sammon, Michael J., Lynne S. Brotman Karmin, Ed Peebles, and Dorée Duncan Seligmann. "MACCS:." In the 1st ACM SIGMOBILE international workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1248054.1248069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sammon, Michael J., Lynne Shapiro Brotman, Ed Peebles, and Dorée Duncan Seligmann. "MACCS." In the 8th conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1152215.1152224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Griest, Kim, and Marvin L. Marshak. "MACHOs." In 10TH CONFERENCE ON THE INTERSECTIONS OF PARTICLE AND NUCLEAR PHYSICS. AIP, 2009. http://dx.doi.org/10.1063/1.3293784.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Macos"

1

Trapnell, Mark, Eric Trapnell, Murugiah Souppaya, Bob Gendler, and Karen Scarfone. Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP). National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.sp.800-219-draft.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bixler, Nathan, and Andrew Nosek. MACCS Theory Manual. Office of Scientific and Technical Information (OSTI), September 2021. http://dx.doi.org/10.2172/1820907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shimizu, S., T. Kawano, K. Murakami, and E. Beier. MAPOS/PPP Tunneling mode. RFC Editor, December 2001. http://dx.doi.org/10.17487/rfc3186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Maruyama, M., and K. Murakami. MAPOS Version 1 Assigned Numbers. RFC Editor, June 1997. http://dx.doi.org/10.17487/rfc2172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Murakami, K., and M. Maruyama. IPv4 over MAPOS Version 1. RFC Editor, June 1997. http://dx.doi.org/10.17487/rfc2176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Foster, J., and D. Chanin. MACCS versus GENII: Code comparison. Office of Scientific and Technical Information (OSTI), September 1991. http://dx.doi.org/10.2172/10130195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Foster, J., and D. Chanin. MACCS versus GENII: Code comparison. Office of Scientific and Technical Information (OSTI), September 1991. http://dx.doi.org/10.2172/6774279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rollstin, J. A., D. I. Chanin, and H. N. Jow. MELCOR Accident Consequence Code System (MACCS). Office of Scientific and Technical Information (OSTI), February 1990. http://dx.doi.org/10.2172/7172209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chanin, D., J. Sprung, L. Ritchie, and Hong-Nian Jow. MELCOR Accident Consequence Code System (MACCS). Office of Scientific and Technical Information (OSTI), February 1990. http://dx.doi.org/10.2172/7038439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Whitebread, Ken, Martin Hofmann, and Lori Pridmore. Multi-Agent Common Operating Environment (MACOE). Fort Belvoir, VA: Defense Technical Information Center, July 2002. http://dx.doi.org/10.21236/ada407683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography