Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 31
- Espionaje 27
- Espías 24
- Computer security 23
- Programming 21
- Novela inglesa 20
- Security measures 20
- Development 19
- Guerra mundial, 1939-1945 19
- History 19
- Application software 17
- Computer networks 16
- Embedded computer systems 13
- Engineering & Applied Sciences 13
- Arduino (Programmable controller) 12
- Computer programming 12
- JavaScript (Computer program language) 12
- Literatura alemana 12
- Servicios de inteligencia 12
- Servicios secretos 12
- Computer input-output equipment 11
- Raspberry Pi (Computer) 11
- Computer software 10
- Internet 10
- Política y gobierno 10
- Python (Computer program language) 10
- Design and construction 9
- Programmable controllers 9
- Relaciones 9
- Computer Science 8
-
681
-
682Publicado 2016“…The worldwide spread of those technologies provides many innovations for consumers, but it can also bear risks, such as the indiscriminate collection, storage and cross-border flow of personal data, illegal spying on Internet activities, dissemination of personal information, and abuse of user passwords. …”
Libro electrónico -
683
-
684
-
685
-
686
-
687Publicado 2019“…If you've ever wondered who Pigrogromitus was, or why Jaques spies on Touchstone and Audrey - or what the famous riddle M.O.A.I. stands for - this is the book for you An accessible, enojyable, occasionally speculative study based on a vast amount of research into some of Shakespeare's more uninterpretable moments…”
Libro electrónico -
688
-
689
-
690
-
691Publicado 2021991009740537306719
-
692por Lázaro Domínguez, FranciscoTabla de Contenidos: “….) -- 4.1 RECOPILANDO INFORMACIÓN VOLÁTIL -- 4.1.1 Fecha y hora del sistema -- 4.1.2 Conexiones de red abiertas -- 4.1.3 Puertos TCP y UDP abiertos -- 4.1.4 Ejecutables conectados a puertos TCP y UDP -- 4.1.5 Usuarios conectados al sistema -- 4.1.6 Tabla de enrutamiento interna -- 4.1.7 Procesos en ejecución -- 4.1.8 Archivos abiertos -- 4.2 ANÁLISIS FORENSE DE LA RAM -- 4.2.1 Captura de RAM completa con dd -- 4.3 ADQUISICIÓN DE SOPORTES -- 4.3.1 Adquisición con EnCase -- 4.3.2 Adquisición con FTK Imager -- 4.3.3 Otros métodos -- 4.4 ANÁLISIS POST MORTEM -- 4.4.1 Análisis con EnCase -- 4.4.2 AccessData FTK -- 4.4.3 Captain Nemo -- 4.4.4 Mount Image Pro -- 4.4.5 FileDisk -- 4.5 INVESTIGACIÓN DEL HISTORIAL DE INTERNET -- 4.5.1 Microsoft Internet Explorer -- 4.5.2 X-Ways Trace -- 4.5.3 iehist -- 4.5.4 Historial de navegación en Mozilla/Firefox -- 4.5.5 Chrome -- 4.6 LA PAPELERA DE RECICLAJE -- 4.6.1 Análisis de la papelera con Rifiuti -- 4.6.2 Funcionamiento de la papelera en Windows Vista/7 -- 4.7 COOKIES -- 4.8 CORREO ELECTRÓNICO -- 4.8.1 Formatos PST y DBX Folders -- 4.8.2 Otros clientes de correo -- 4.8.3 Paraben's E-Mail Examiner -- 4.9 BÚSQUEDA DE CARACTERES -- 4.9.1 SectorSpy, Disk Investigator y Evidor -- 4.9.2 X-Ways Forensics -- 4.10 METADATOS…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
693Publicado 2019Tabla de Contenidos: “…I2C Interface -- 6.2.11. SPI Interface -- 6.2.12. I2S Interface -- 6.2.13. …”
Libro electrónico -
694por Cothran, Boyd“…The first truly global study of women warriors, individual chapters examine figures such as Joan of Arc in Cairo, revenging daughters in Samurai Japan, a transgender Mexican revolutionary and WWII Chinese spies. Exploring issues of violence, gender fluidity, memory and nation-building, the authors discuss how these real or imagined female figures were constructed and deployed in different national and transnational contexts. …”
Publicado 2020
Libro electrónico -
695por Copeland, Marshall. author“…Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion d etection Identify potential vulnerabilities Prevent enterprise security failures…”
Publicado 2017
Libro electrónico -
696Publicado 2023“…Continually surrounded by Japanese guards, spies, cooks, concubines and interpreters they were eager to continue their trading activities with their Japanese hosts. …”
Libro electrónico -
697por Ludlum, Robert, 1927-2001“…The world's two deadliest spies in the ultimate showdown. At a small-town carnival two men, each mysteriously summoned by telegram, witness a bizarre killing. …”
Publicado 1990
Libro -
698
-
699por Nechaeva, Ekaterina“…Throughout the book the analysis of secret negotiations, the intelligence system and spy activities of envoys, plots and political murders reveals the shadowy side of diplomacy…”
Publicado 2014
Libro -
700