Mostrando 681 - 700 Resultados de 2,988 Para Buscar '"Linux"', tiempo de consulta: 0.09s Limitar resultados
  1. 681
    Publicado 2015
    Tabla de Contenidos: “…Cover; Title Page; Copyight; Contents; Part I: The Linux Command Line; Chapter 1: Starting with Linux Shells; What Is Linux?…”
    Libro electrónico
  2. 682
  3. 683
    Publicado 2015
    Materias: “…Linux…”
    Libro electrónico
  4. 684
    Publicado 2020
    Materias: “…Linux Examinations Study guides…”
    Libro electrónico
  5. 685
    Publicado 2017
    Materias: “…Linux Examinations Study guides…”
    Video
  6. 686
    por Dulaney, Emmett A.
    Publicado 2004
    Materias: “…Linux…”
    Libro electrónico
  7. 687
    Publicado 2018
    Tabla de Contenidos: “…Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x…”
    Libro electrónico
  8. 688
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Credits -- Disclaimer -- About the Author -- Acknowledgments -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: Kali Linux and Wireless Networking -- Introduction -- Getting started with Kali -- Installing Kali Linux -- Getting ready -- How to do it... -- Virtualized versus physical -- Pre-installation checklist -- Choosing an installation option -- Hard drive selection -- Network cards and wireless -- Installing Kali Linux on a PC -- Getting ready -- How to do it... -- Installing Kali in a virtual environment -- Getting ready -- How to do it... -- Updating Kali Linux -- How to do it... -- Preparing for wireless pentesting -- How to do it... -- There's more... -- Bluetooth adapters -- Chapter 2: Attacking Access Controls -- Introduction -- Types of access control attacks -- Working with war driving -- Getting ready -- How to do it... -- Mapping access points and increasing accuracy -- Getting ready -- How to do it... -- Creating a rogue access point -- Getting ready -- How to do it... -- Evading MAC filtering with MAC spoofing -- Getting ready -- How to do it... -- Identifying promiscuous clients -- Getting ready -- How to do it... -- Chapter 3: Attacking Integrity Controls -- Introduction -- Types of attack -- Sniffing on a wireless network -- How does sniffing work? …”
    Libro electrónico
  9. 689
    Publicado 2017
    Tabla de Contenidos: “…-- Summary -- Chapter 12: Educating the Customer and Finishing Up -- Finishing up -- Avoiding surprises with constant contact -- Establishing periodic updates -- When to hit the big red button -- Weaving optimism with your action plan -- The executive summary -- Introduction -- Highlights, scoring, and risk recap -- More on risk -- Guidance - earning your keep -- Detailed findings -- The Dradis framework -- MagicTree -- Other documentation and organization tools -- Graphics for your reports -- Bringing best practices -- Baking in security -- Honing the SDLC -- Role-play - enabling the team -- Picking a winner -- Plans and programs -- More on change management -- Automate and adapt -- Assessing the competition -- Backbox Linux -- Samurai web testing framework -- Fedora Security Spin -- Other Linux pen test distros -- What About Windows and macOS? …”
    Libro electrónico
  10. 690
    Publicado 2005
    Tabla de Contenidos: “…pt. 1. Oracle on Linux overview -- pt. 2. Deploying Oracle 10g on Linux -- pt. 3. …”
    Libro electrónico
  11. 691
    Publicado 2019
    Materias: “…Linux Examinations Study guides…”
    Video
  12. 692
    Publicado 2016
    Libro electrónico
  13. 693
    por Bergland, John
    Publicado 2004
    Tabla de Contenidos: “…Introduction to Domino Web Access 6.5 on Linux -- 1.1 Overview of Domino Web Access 6.5 -- 1.2 Why Domino Web Access 6.5? …”
    Libro electrónico
  14. 694
    por Blum, Richard, 1962-
    Publicado 2008
    Tabla de Contenidos: “…Command Line and Shell Scripting Bible; About the Author; Credits; Contents at a Glance; Contents; Acknowledgments; Introduction; Who Should Read This Book; How This Book Is Organized; Minimum Requirements; Where to Go from Here; Part I: The Linux Command Line; Chapter 1: Starting with Linux Shells; What Is Linux?…”
    Libro electrónico
  15. 695
    por Pogue, Chris
    Publicado 2008
    Tabla de Contenidos: “…Front Cover; Unix and Linux Forensic Analysis DVD Toolkit; Copyright Page; Co-Authors; Appendix Contributor; Contents; Chapter 1: Introduction; History; Target Audience; What is Covered; What is Not Covered; Chapter 2: Understanding Unix; Introduction; Unix, UNIX, Linux, and *nix; Linux Distributions; Get a Linux!…”
    Libro electrónico
  16. 696
    por Hobson, Jonathan
    Publicado 2013
    Materias: “…Linux…”
    Libro electrónico
  17. 697
    por Goodwin, Steven
    Publicado 2013
    Tabla de Contenidos: “…""In-Wall Transmitter Modules""""Motion Sensors""; ""Gateways and Other Exotic Devices""; ""Computer Control""; ""Heyu""; ""Configuration""; ""Sending Messages""; ""Receiving Messages""; ""Programming the EEPROM""; ""Z-Wave""; ""System Design""; ""Bypassing NDAs""; ""Open Z-Wave""; ""LinuxMCE""; ""ZigBee""; ""Linux Software""; ""The Differences with Z-Wave""; ""C-Bus""; ""About C-Bus""; ""Differences Between X10 and C-Bus""; ""Devices""; ""Controlling Lights""; ""Controlling Appliances""; ""Controllers""; ""Gateways""; ""Lighting Control""; ""Hue""; ""Insteon""; ""Lifx""; ""Night Lights""…”
    Libro electrónico
  18. 698
    Publicado 2022
    Tabla de Contenidos: “…. -- Converting DOS text to Linux text and vice versa -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using cut -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using egrep -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using sed -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 9: An Introduction to Shell Scripting -- Technical requirements -- Writing your first Bash shell script -- Getting ready -- How to do it... -- How it works... -- Serializing basic commands - from simple to complex -- Getting ready -- How to do it... -- How it works... -- There's more... -- Manipulating shell script input, output, and errors -- Getting ready -- How to do it... -- How it works... -- Shell script hygiene -- Getting ready -- How to do it... -- There's more... -- Chapter 10: Using Loops -- The for loop -- Getting ready -- How to do it... -- How it works... -- See also -- break and continue -- Getting ready -- How to do it... -- How it works... -- See also -- The while loop -- Getting ready -- How to do it... -- How it works... -- See also -- The test-if loop -- Getting ready -- How to do it... -- How it works... -- See also -- The case loop -- Getting ready -- How to do it... -- How it works... -- See also -- Logical looping with and, or, and not -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 11: Working with Variables -- Technical requirements -- Using shell variables -- Getting ready -- How to do it... -- How it works... -- See also -- Using variables in shell scripting -- Getting ready -- How to do it... -- How it works... -- See also -- Quoting in the shell -- Getting ready -- How to do it... -- How it works... -- See also…”
    Libro electrónico
  19. 699
    Publicado 2022
    Tabla de Contenidos: “…Mastering Kali Linux for Advanced Penetration Testing – Fourth Edition: Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite…”
    Libro electrónico
  20. 700
    por Malin, Cameron H.
    Publicado 2014
    Tabla de Contenidos: “…Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen…”
    Libro electrónico