Mostrando 441 - 460 Resultados de 2,988 Para Buscar '"Linux"', tiempo de consulta: 0.08s Limitar resultados
  1. 441
    Publicado 2018
    Tabla de Contenidos: “…Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes…”
    Libro electrónico
  2. 442
    por Both, David. author
    Publicado 2018
    Tabla de Contenidos: “…Introduction -- 1. Introduction to the Linux Philosophy -- 2. Getting Ready -- Part 2. Foundation -- 3. …”
    Libro electrónico
  3. 443
    Publicado 2020
    Tabla de Contenidos: “…File System -- 7. Networking -- 8. Linux Development on WSL -- 9. Linux Desktop on WSL. …”
    Libro electrónico
  4. 444
    Publicado 2019
    Tabla de Contenidos: “…Learn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark…”
    Libro electrónico
  5. 445
    Publicado 2020
    Materias: “…Linux…”
    Video
  6. 446
    Publicado 2020
    “…LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. …”
    Libro electrónico
  7. 447
    Publicado 2017
    Materias: “…Linux…”
    Libro electrónico
  8. 448
    Publicado 2015
    “…Get more done faster at the Linux command line! This best-selling Linux Phrasebook has been thoroughly updated in the second edition to reflect the newest distributions, incorporate feedback from hundreds of active Linux users, and cover today's newest tools and techniques -- including an entirely new chapter on text file manipulation. …”
    Libro electrónico
  9. 449
    Publicado 2017
    Materias: “…Linux…”
    Video
  10. 450
    Publicado 2011
    “…Un ouvrage conçu pour les programmeurs Linux et Unix les plus exigeants Sans équivalent en langue française, l'ouvrage de Christophe Blaess constitue une référence complète du développement système sous Linux, y compris dans les aspects les plus avancés de la gestion des processus, des threads ou de la mémoire. …”
    Libro electrónico
  11. 451
    Publicado 2013
    Materias: “…Linux…”
    Libro electrónico
  12. 452
    por Cameron, Jamie
    Publicado 2004
    Materias: “…Linux…”
    Libro electrónico
  13. 453
    por Bautts, Tony
    Publicado 2005
    Materias: “…Linux…”
    Libro electrónico
  14. 454
    Publicado 2004
    Materias: “…Linux…”
    Libro electrónico
  15. 455
    Publicado 2006
    Materias: “…Linux…”
    Libro electrónico
  16. 456
    Publicado 2022
    Materias: “…Linux…”
    Libro electrónico
  17. 457
    por Parasram, Shiva V. N.
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credit -- Dedicated -- Contributors -- Table of Contents -- Preface -- Part 1: Blue and Purple Teaming Fundamentals -- Chapter 1: Red, Blue, and Purple Teaming Fundamentals -- How I got started with Kali Linux -- What is Kali Linux? -- Why is Kali Linux so popular? …”
    Libro electrónico
  18. 458
    Publicado 2024
    Materias: “…Linux…”
    Video
  19. 459
    Publicado 2024
    Tabla de Contenidos: “…Use Managed Service Accounts (MSAs) or Group Managed Service Accounts (gMSAs) -- Limit Service Account Privileges -- Monitor for Unusual Activity -- Implement Kerberos Armoring -- Enable Kerberos Ticket Lifetime Policies -- Monitor and Protect the KRBTGT Account -- Implement Credential Guard -- Use Extended Protection for Authentication -- Regularly Update and Patch Systems -- Educate Users and Administrators -- Consider Network Segmentation -- Bonus Chapter -- Install VMware Player & Kali Linux -- Kali Linux -- Setting the IP address -- Kali Linux -- Updating -- Installing Metasploitable 2…”
    Libro electrónico
  20. 460
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Ethical Hacking -- Understanding the need for cybersecurity -- Exploring cybersecurity terminology -- Identifying threat actors and their intent -- Understanding what matters to threat actors -- Time -- Resources -- Financial factors -- Hack value -- Exploring the importance of penetration testing -- Penetration testing methodologies -- Pre-engagement phase -- Information-gathering phase -- Threat modeling -- Vulnerability analysis -- Exploitation -- Post-exploitation -- Report writing -- Discovering penetration testing approaches -- Types of penetration testing -- Web application penetration testing -- Mobile application penetration testing -- Social engineering penetration testing -- Network penetration testing (external and internal) -- Cloud penetration testing -- Physical penetration testing -- Exploring the phases of penetration testing -- Reconnaissance -- Scanning and enumeration -- Gaining access (exploitation) -- Maintaining access -- Covering your tracks -- Understanding the Cyber Kill Chain framework -- Reconnaissance -- Weaponization -- Delivery -- Exploitation -- Installation -- Command and Control (C2) -- Actions on objectives -- Summary -- Further reading -- Chapter 2: Building a Penetration Testing Lab -- Technical requirements -- An overview of the lab setup and technologies used -- Setting up a hypervisor and virtual networks -- Part 1 - setting up the hypervisor -- Part 2 - creating virtually isolated networks -- Setting up and working with Kali Linux -- Part 1 - deploying Kali Linux as a virtual machine -- Part 2 - customizing Kali Linux and its network adapters -- Part 3 - getting started with Kali Linux -- Part 4 - updating repository sources and packages -- Setting up a vulnerable web application…”
    Libro electrónico