Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 11
- Security measures 10
- Computer networks 9
- Engineering & Applied Sciences 4
- Cryptocurrencies 3
- Information technology 3
- Bankman-Fried, Sam 2
- Bankruptcy 2
- Business enterprises 2
- Compulsive hoarding 2
- Computer Science 2
- Corrupt practices 2
- Data protection 2
- Electrical & Computer Engineering 2
- FTX (Firm) 2
- Financial services industry 2
- Fraud 2
- Management 2
- Obsessive-compulsive disorder 2
- Operating systems (Computers) 2
- Telecommunications 2
- Aesthetics 1
- Android (Electronic resource) 1
- Application software 1
- Benestar social 1
- Blockchains (Databases) 1
- Business 1
- Business & Economics 1
- Business and Management, general 1
- Caso Watergate, 1972-1974 1
-
21Publicado 2022Tabla de Contenidos: “…-- 3.3.1 The bad guys: Black hats -- 3.3.2 The middle ground: Grey hats -- 3.3.3 The good guys: White hats -- 3.4 Working through a real-life problem: How do hackers think? …”
Libro electrónico -
22Publicado 2017Tabla de Contenidos: “…Zero-day exploits -- 3.4.2. The good guys vs the bad guys -- 3.4.3. Vulnerability timeline -- 3.4.4. …”
Libro electrónico -
23Publicado 2005“…And, much worse, nearly nobody cares about this conceptual disaster - the main thing being, whether or not you are taking sides with the good guys. This volume is an analytical attempt to end this disaster. …”
Libro electrónico -
24Publicado 2014“…Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for v…”
Libro electrónico -
25por Tibble, Ian“…As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. …”
Publicado 2012
Libro electrónico -
26por Dang, Bruce“…Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. …”
Publicado 2014
Libro electrónico -
27Publicado 2007“…Meet the Bad Guys 5. Meet the Good Guys: Cognitive-Behavioral Strategies for Beating Hoarding 6. …”
Libro electrónico -
28Publicado 2019“…"Research has uncovered shocking violations of ethical and legal standards by the "good guys"--including Judge John Sirica, Archibald Cox, and Leon Jaworski. …”
Libro -
29Publicado 2023“…But politics is a dirty business, and in a world where lying, cheating, and backstabbing are the norm, sometimes the good guys can find themselves outgunned." --page [5] of cover…”
Libro -
30Publicado 2008“…Author royalties from this book go to the Huntsman Cancer Foundation “The way Jon conducts his business and lives his life will not only inspire you to be a better person, citizen, and entrepreneur, it also will give you hope that the good guys don't finish last.” Glenn Beck "Jon Huntsman is a different breed. …”
Libro electrónico -
31Publicado 2004“…O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. …”
Libro electrónico -
32Publicado 2003“…Windows XP Hacks is the latest in O'Reilly's new Hacks Series which aims to begin reclaiming the term "hacking" for the good guys. In recent years, the term has come to be associated with those nefarious black hats who break into computers to snoop, steal information or disrupt Internet traffic. …”
Libro electrónico -
33Publicado 2003“…Mac OS X Hacks is the third in O'Reilly's new Hacks Serier which aims to begin reclaiming the term "hacking" for the good guys. In recent years, the term has come to be associated with those nefarious black hats who break into computers to snoop, steal information or disrupt Internet traffic. …”
Libro electrónico -
34Publicado 2003“…Written by experts for intelligent, advanced users, O'Reilly's new Hacks Series have begun to reclaim the term "hacking" for the good guys. In recent years the term "hacker" has come to be associated with those nefarious black hats who break into other people's computers to snoop, steal information, or disrupt Internet traffic. …”
Libro electrónico -
35Publicado 2008“…He’s the updated version of 'To Catch a Thief'[el]but he’s a good guy!" Nancy E. Sheppard , President & CEO of Western Independent Bankers (A Trade Association of 350 Banks) "If you’re not worried about identity theft, you should be[el]and Stickley tells you exactly why. …”
Libro electrónico -
36Publicado 2010“…Bonnie shares her personal story so that you can be protected from the scammers and the thieves that seem to lurk in the shadows. 99% of financial advisors are the good guys that wear the white hats and really want to help their clients succeed. …”
Libro electrónico -
37Publicado 2024“…In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as "a blogger, InfoSec specialist, super hero...and all around good guy." Skill Level: Beginner Learn How To: Protect data and secure an organizations operation in their day-to-day business Observe, collect, and secure date Detect common security encounters and be prepared for them Implement processes that allow communication of information in a correct and timely manner Who Should Take This Course: Cybersecurity Professionals Anyone interested in learning cyber security fundamentals. …”
Video -
38Publicado 2024“…In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as "a blogger, InfoSec specialist, super hero...and all around good guy." Skill Level: Beginner Learn How To: Apply key threat intelligence and threat hunting concepts Understand and classify hot attacks are taking advantage of vulnerabilities Use common vulnerability assessment methodologies Understand threats against Internet of Things, real-operating systems, and cloud-based environments Who Should Take This Course: Cybersecurity Professionals Anyone interested in learning cyber security fundamentals. …”
Video -
39Publicado 2022“…In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as "a blogger, InfoSec specialist, super hero...and all-around good guy." Skill Level Beginner Learn How To Understand the basics of blockchain technology Work blockchain and cryptocurrencies Create and store cryptocurrencies Create NFTs Write and enforce smart contracts on blockchains Course requirement None Who Should Take This Course Anyone interested in learning about blockchain Pen testing or ed team for blockchain applications Blockchain Engineers and Architects for Enterprise IT organizations Cryptocurrency expert or advisor About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. …”
Video