Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
441Publicado 2018Tabla de Contenidos: “…Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes…”
Libro electrónico -
442por Both, David. authorTabla de Contenidos: “…Introduction -- 1. Introduction to the Linux Philosophy -- 2. Getting Ready -- Part 2. Foundation -- 3. …”
Publicado 2018
Libro electrónico -
443Publicado 2020Tabla de Contenidos: “…File System -- 7. Networking -- 8. Linux Development on WSL -- 9. Linux Desktop on WSL. …”
Libro electrónico -
444Publicado 2019Tabla de Contenidos: “…Learn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark…”
Libro electrónico -
445
-
446Publicado 2020“…LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. …”
Libro electrónico -
447Publicado 2017Materias: “…Linux…”
Libro electrónico -
448Publicado 2015“…Get more done faster at the Linux command line! This best-selling Linux Phrasebook has been thoroughly updated in the second edition to reflect the newest distributions, incorporate feedback from hundreds of active Linux users, and cover today's newest tools and techniques -- including an entirely new chapter on text file manipulation. …”
Libro electrónico -
449
-
450Publicado 2011“…Un ouvrage conçu pour les programmeurs Linux et Unix les plus exigeants Sans équivalent en langue française, l'ouvrage de Christophe Blaess constitue une référence complète du développement système sous Linux, y compris dans les aspects les plus avancés de la gestion des processus, des threads ou de la mémoire. …”
Libro electrónico -
451
-
452
-
453
-
454
-
455
-
456Publicado 2022Materias: “…Linux…”
Libro electrónico -
457por Parasram, Shiva V. N.Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credit -- Dedicated -- Contributors -- Table of Contents -- Preface -- Part 1: Blue and Purple Teaming Fundamentals -- Chapter 1: Red, Blue, and Purple Teaming Fundamentals -- How I got started with Kali Linux -- What is Kali Linux? -- Why is Kali Linux so popular? …”
Publicado 2023
Libro electrónico -
458
-
459Publicado 2024Tabla de Contenidos: “…Use Managed Service Accounts (MSAs) or Group Managed Service Accounts (gMSAs) -- Limit Service Account Privileges -- Monitor for Unusual Activity -- Implement Kerberos Armoring -- Enable Kerberos Ticket Lifetime Policies -- Monitor and Protect the KRBTGT Account -- Implement Credential Guard -- Use Extended Protection for Authentication -- Regularly Update and Patch Systems -- Educate Users and Administrators -- Consider Network Segmentation -- Bonus Chapter -- Install VMware Player & Kali Linux -- Kali Linux -- Setting the IP address -- Kali Linux -- Updating -- Installing Metasploitable 2…”
Libro electrónico -
460Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Ethical Hacking -- Understanding the need for cybersecurity -- Exploring cybersecurity terminology -- Identifying threat actors and their intent -- Understanding what matters to threat actors -- Time -- Resources -- Financial factors -- Hack value -- Exploring the importance of penetration testing -- Penetration testing methodologies -- Pre-engagement phase -- Information-gathering phase -- Threat modeling -- Vulnerability analysis -- Exploitation -- Post-exploitation -- Report writing -- Discovering penetration testing approaches -- Types of penetration testing -- Web application penetration testing -- Mobile application penetration testing -- Social engineering penetration testing -- Network penetration testing (external and internal) -- Cloud penetration testing -- Physical penetration testing -- Exploring the phases of penetration testing -- Reconnaissance -- Scanning and enumeration -- Gaining access (exploitation) -- Maintaining access -- Covering your tracks -- Understanding the Cyber Kill Chain framework -- Reconnaissance -- Weaponization -- Delivery -- Exploitation -- Installation -- Command and Control (C2) -- Actions on objectives -- Summary -- Further reading -- Chapter 2: Building a Penetration Testing Lab -- Technical requirements -- An overview of the lab setup and technologies used -- Setting up a hypervisor and virtual networks -- Part 1 - setting up the hypervisor -- Part 2 - creating virtually isolated networks -- Setting up and working with Kali Linux -- Part 1 - deploying Kali Linux as a virtual machine -- Part 2 - customizing Kali Linux and its network adapters -- Part 3 - getting started with Kali Linux -- Part 4 - updating repository sources and packages -- Setting up a vulnerable web application…”
Libro electrónico