Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 11
- Security measures 10
- Computer networks 9
- Engineering & Applied Sciences 4
- Cryptocurrencies 3
- Information technology 3
- Bankman-Fried, Sam 2
- Bankruptcy 2
- Business enterprises 2
- Compulsive hoarding 2
- Computer Science 2
- Corrupt practices 2
- Data protection 2
- Electrical & Computer Engineering 2
- FTX (Firm) 2
- Financial services industry 2
- Fraud 2
- Management 2
- Obsessive-compulsive disorder 2
- Operating systems (Computers) 2
- Telecommunications 2
- Aesthetics 1
- Android (Electronic resource) 1
- Application software 1
- Benestar social 1
- Blockchains (Databases) 1
- Business 1
- Business & Economics 1
- Business and Management, general 1
- Caso Watergate, 1972-1974 1
-
1
-
2
Grabación de sonido -
3
-
4Publicado 2023“…A first-hand look at the extraordinary collapse of FTX, Alameda Research, and Sam Bankman-Fried In SBF: How the FTX Bankruptcy Unwound Crypto's Very Bad Good Guy, accomplished crypto reporter Brady Dale presents an engrossing take on the spectacular and sudden implosion of FTX, Alameda Research, and their associated companies, as well as the criminal indictments of Sam Bankman-Fried and several of his associates. …”
Grabación no musical -
5Publicado 2017“…Understanding how the good guys find system and web app vulnerabilities before the bad guys do…”
-
6
-
7
-
8por Mika, 1983-Tabla de Contenidos: “…Talk About You, All She Wants ; Last Party ; Good Guys ; Oh Girl, You're the Devil ; No Place In Heaven; Staring At the Sun; Hurts ; Good Wife ; Rio ; Ordinary Man; Promiseland ; Porcelain ; Good Guys [Night Time Mix]…”
Publicado 2015
CDROM -
9por Tolin, David F.Tabla de Contenidos: “…-- Meet the bad guys -- Meet the good guys : strategies for beating hoarding -- How did this happen? …”
Publicado 2014
Libro electrónico -
10Publicado 2018Tabla de Contenidos: “…Introduction: Good-ish people -- Part I: Builders activate a growth mindset -- Stumbling upward -- One of the "good guys" -- If you are not part of the problem, you cannot be part of the solution -- Part II: Builders see and use their ordinary privilege -- Knowing it when you don't see it -- The power of ordinary privilege -- Part III: Builders opt for willful awareness -- Keep your eyes open, anyway -- Look out for these four "good" intentions -- Part IV: Builders engage -- Be inclusive -- Steer the conversation -- Educate and occasionally confront others -- Show meaningful support…”
Libro electrónico -
11por Markos, LouisTabla de Contenidos: “…Fractured fairy tales and the cult of the ugly ; The Space Trilogy I : the beauty of hierarchy ; The Space Trilogy II : the beauty of the normal ; Narnia I : the beauty of complementarity ; Narnia II : the beauty of light and truth ; Till We Have Faces : the beauty of beauty -- Part II. The good guys and the bad guys. The nature of good and evil ; Further up and further down ; Heroes and villains ; Courage along the road ; The heirs of Nietzsche -- Part III. …”
Publicado 2010
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
12Publicado 2012Tabla de Contenidos: “…Intro -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I: Casing the Establishment -- Case Study -- IAAAS-It's All About Anonymity, Stupid -- Tor-menting the Good Guys -- 1 Footprinting -- What is Footprinting? …”
Libro electrónico -
13Tabla de Contenidos: “….; Other Survival Skills That Consultants Cannot Supply; Bad Reason #2: To Provide or Repair a Skill or Knowledge that Cannot Be Trained; Leadership: An Untrainable Skill; Personality Theory; Emotional Intelligence Theory; The Faulty Mechanics of Leadership Training; Other Untrainable Skills; Bad Reason #3: To Validate an Initiative that a Company Already Plans on Doing; Consultants as the Bad Guys; Consultants as the Good Guys…”
Libro electrónico -
14por Bauer, Michael D.Tabla de Contenidos: “…Deleting Unnecessary User Accounts and Restricting Shell AccessRestricting Access to Known Users; Running Services in chrooted Filesystems; Minimizing Use of SUID root; Identifying and dealing with SUID root files; Using su and sudo; Using su; Using sudo; Configuring, Managing, and Monitoring Logs; Every System Can Be Its Own Firewall: Using iptables for Local Security; Using iptables: Preparatory steps; How netfilter works; Using iptables; Checking Your Work with Scanners; Types of scans and their uses; Why we (good guys) scan; nmap, world champion port scanner; Getting and installing nmap…”
Publicado 2005
Libro electrónico -
15por Hall, Liz, 1964-Tabla de Contenidos: “…Making the business case for mindfulnessRunning mindfulness programmes; 11 The FEEL model; FEEL: a model for applying mindfulness; The model; Client issues; 12 Stress, anxiety, depression and work-life balance; The good guy and the bad guy; How stress affects us; Approach and avoidance orientation; Discrepancy-based processing; How mindfulness can help; Remedial coaching; The great god of busyness; 13 Resilience, happiness and wellbeing; Definitions; What makes us resilient?…”
Publicado 2013
Libro electrónico -
16Publicado 2023Tabla de Contenidos: “…Chapter 13 Selling to the Good Guys-Regulation, Self-Criticism, and "Clean" Offensive Cybertechnology -- The Israeli regulator -- Offensive cyber as a geopolitical tool -- Final reflections -- Section 4 Building a Cyberstate -- Chapter 14 The Israeli Silicon Valley-Small State, Big Data -- Chapter 15 Unit 8200-Secrets of the IDF's Success -- "We've got to go up a notch" -- The story of Unit 8200 -- Unit 81: Making the impossible, possible -- Cyberintelligence: Challenges and opportunities -- Building the Israeli military's cybersecurity apparatus -- The ARAM Course -- From offense to defense -- The key to success -- Overcoming any obstacle -- The old boys' club -- Closed club? …”
Libro electrónico -
17Publicado 2022Tabla de Contenidos: “…-- How to Prevent Social Engineering Attacks on Your Business -- UI and UX Design -- Internal Threats -- Hacktivism -- Chapter 8 Step 8: Build Redundancy and Resilience -- Understanding Data and Networks -- Building Capacity and Scalability with the Power of the Cloud -- Back It Up, Back It Up, Back It Up -- RAID -- What Ransomware Taught Business About Backups -- Business Continuity -- Disaster Recovery -- Chapter 9 Afterword -- Step 1 -- The Most Notorious Cyberattacker Was Actually a Con Man -- A Strong Security Culture Requires All Hands on Deck -- Hackers Are the Good Guys, Actually -- What Is Security Culture? -- What Makes a Good CISO? …”
Libro electrónico -
18Publicado 2013Tabla de Contenidos: “…-- Mitigating the Insider Threat -- Be Vigilant -- We've Covered -- Part IV: Final Thoughts -- Chapter 12: The Never-Ending Race -- A Short Review of the Book -- Predictions -- The Future of Malware -- The Future of Rootkits -- The Future of Botnets -- The Good Guys Are Busy Too -- The Adventure Has Just Begun -- We've Covered -- Appendix A: The Bootup Process -- The Windows Bootup Process -- BIOS-Based system -- EFI-Based System -- Appendix B: Useful Links -- Vulnerability Information -- Free Online Security Products -- Free File Scanner and Analysis Tools -- Web Security -- Malware Trackers -- Other Important Links -- Glossary -- Index…”
Libro electrónico -
19Publicado 2023Tabla de Contenidos: “…Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Environmental problems caused by humans -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- 2 Personal Cybersecurity -- Chapter 1 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment -- Your work environment…”
Libro electrónico -
20CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…Malvertising -- Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Man-made environmental problems -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- Part 2 Improving Your Own Personal Security -- Chapter 4 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment…”
Libro electrónico