Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
681Publicado 2015Tabla de Contenidos: “…Cover; Title Page; Copyight; Contents; Part I: The Linux Command Line; Chapter 1: Starting with Linux Shells; What Is Linux?…”
Libro electrónico -
682
-
683Publicado 2015Materias: “…Linux…”
Libro electrónico -
684Publicado 2020Materias: “…Linux Examinations Study guides…”
Libro electrónico -
685Publicado 2017Materias: “…Linux Examinations Study guides…”
-
686
-
687Publicado 2018Tabla de Contenidos: “…Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x…”
Libro electrónico -
688Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Credits -- Disclaimer -- About the Author -- Acknowledgments -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: Kali Linux and Wireless Networking -- Introduction -- Getting started with Kali -- Installing Kali Linux -- Getting ready -- How to do it... -- Virtualized versus physical -- Pre-installation checklist -- Choosing an installation option -- Hard drive selection -- Network cards and wireless -- Installing Kali Linux on a PC -- Getting ready -- How to do it... -- Installing Kali in a virtual environment -- Getting ready -- How to do it... -- Updating Kali Linux -- How to do it... -- Preparing for wireless pentesting -- How to do it... -- There's more... -- Bluetooth adapters -- Chapter 2: Attacking Access Controls -- Introduction -- Types of access control attacks -- Working with war driving -- Getting ready -- How to do it... -- Mapping access points and increasing accuracy -- Getting ready -- How to do it... -- Creating a rogue access point -- Getting ready -- How to do it... -- Evading MAC filtering with MAC spoofing -- Getting ready -- How to do it... -- Identifying promiscuous clients -- Getting ready -- How to do it... -- Chapter 3: Attacking Integrity Controls -- Introduction -- Types of attack -- Sniffing on a wireless network -- How does sniffing work? …”
Libro electrónico -
689Publicado 2017Tabla de Contenidos: “…-- Summary -- Chapter 12: Educating the Customer and Finishing Up -- Finishing up -- Avoiding surprises with constant contact -- Establishing periodic updates -- When to hit the big red button -- Weaving optimism with your action plan -- The executive summary -- Introduction -- Highlights, scoring, and risk recap -- More on risk -- Guidance - earning your keep -- Detailed findings -- The Dradis framework -- MagicTree -- Other documentation and organization tools -- Graphics for your reports -- Bringing best practices -- Baking in security -- Honing the SDLC -- Role-play - enabling the team -- Picking a winner -- Plans and programs -- More on change management -- Automate and adapt -- Assessing the competition -- Backbox Linux -- Samurai web testing framework -- Fedora Security Spin -- Other Linux pen test distros -- What About Windows and macOS? …”
Libro electrónico -
690Publicado 2005Tabla de Contenidos: “…pt. 1. Oracle on Linux overview -- pt. 2. Deploying Oracle 10g on Linux -- pt. 3. …”
Libro electrónico -
691Publicado 2019Materias: “…Linux Examinations Study guides…”
-
692
-
693por Bergland, JohnTabla de Contenidos: “…Introduction to Domino Web Access 6.5 on Linux -- 1.1 Overview of Domino Web Access 6.5 -- 1.2 Why Domino Web Access 6.5? …”
Publicado 2004
Libro electrónico -
694por Blum, Richard, 1962-Tabla de Contenidos: “…Command Line and Shell Scripting Bible; About the Author; Credits; Contents at a Glance; Contents; Acknowledgments; Introduction; Who Should Read This Book; How This Book Is Organized; Minimum Requirements; Where to Go from Here; Part I: The Linux Command Line; Chapter 1: Starting with Linux Shells; What Is Linux?…”
Publicado 2008
Libro electrónico -
695por Pogue, ChrisTabla de Contenidos: “…Front Cover; Unix and Linux Forensic Analysis DVD Toolkit; Copyright Page; Co-Authors; Appendix Contributor; Contents; Chapter 1: Introduction; History; Target Audience; What is Covered; What is Not Covered; Chapter 2: Understanding Unix; Introduction; Unix, UNIX, Linux, and *nix; Linux Distributions; Get a Linux!…”
Publicado 2008
Libro electrónico -
696
-
697por Goodwin, StevenTabla de Contenidos: “…""In-Wall Transmitter Modules""""Motion Sensors""; ""Gateways and Other Exotic Devices""; ""Computer Control""; ""Heyu""; ""Configuration""; ""Sending Messages""; ""Receiving Messages""; ""Programming the EEPROM""; ""Z-Wave""; ""System Design""; ""Bypassing NDAs""; ""Open Z-Wave""; ""LinuxMCE""; ""ZigBee""; ""Linux Software""; ""The Differences with Z-Wave""; ""C-Bus""; ""About C-Bus""; ""Differences Between X10 and C-Bus""; ""Devices""; ""Controlling Lights""; ""Controlling Appliances""; ""Controllers""; ""Gateways""; ""Lighting Control""; ""Hue""; ""Insteon""; ""Lifx""; ""Night Lights""…”
Publicado 2013
Libro electrónico -
698Publicado 2022Tabla de Contenidos: “…. -- Converting DOS text to Linux text and vice versa -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using cut -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using egrep -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using sed -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 9: An Introduction to Shell Scripting -- Technical requirements -- Writing your first Bash shell script -- Getting ready -- How to do it... -- How it works... -- Serializing basic commands - from simple to complex -- Getting ready -- How to do it... -- How it works... -- There's more... -- Manipulating shell script input, output, and errors -- Getting ready -- How to do it... -- How it works... -- Shell script hygiene -- Getting ready -- How to do it... -- There's more... -- Chapter 10: Using Loops -- The for loop -- Getting ready -- How to do it... -- How it works... -- See also -- break and continue -- Getting ready -- How to do it... -- How it works... -- See also -- The while loop -- Getting ready -- How to do it... -- How it works... -- See also -- The test-if loop -- Getting ready -- How to do it... -- How it works... -- See also -- The case loop -- Getting ready -- How to do it... -- How it works... -- See also -- Logical looping with and, or, and not -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 11: Working with Variables -- Technical requirements -- Using shell variables -- Getting ready -- How to do it... -- How it works... -- See also -- Using variables in shell scripting -- Getting ready -- How to do it... -- How it works... -- See also -- Quoting in the shell -- Getting ready -- How to do it... -- How it works... -- See also…”
Libro electrónico -
699Publicado 2022Tabla de Contenidos: “…Mastering Kali Linux for Advanced Penetration Testing – Fourth Edition: Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite…”
Libro electrónico -
700por Malin, Cameron H.Tabla de Contenidos: “…Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen…”
Publicado 2014
Libro electrónico