Mostrando 1 - 20 Resultados de 39 Para Buscar '"The Good Guy"', tiempo de consulta: 0.13s Limitar resultados
  1. 1
    por Friendly, Fred W.
    Publicado 1977
    Libro
  2. 2
    “…Good Guys…”
    Grabación de sonido
  3. 3
    Publicado 2023
    Libro electrónico
  4. 4
    Publicado 2023
    “…A first-hand look at the extraordinary collapse of FTX, Alameda Research, and Sam Bankman-Fried In SBF: How the FTX Bankruptcy Unwound Crypto's Very Bad Good Guy, accomplished crypto reporter Brady Dale presents an engrossing take on the spectacular and sudden implosion of FTX, Alameda Research, and their associated companies, as well as the criminal indictments of Sam Bankman-Fried and several of his associates. …”
    Grabación no musical
  5. 5
    Publicado 2017
    “…Understanding how the good guys find system and web app vulnerabilities before the bad guys do…”
    Video
  6. 6
    Publicado 2002
    Libro
  7. 7
    Publicado 2013
    Video
  8. 8
    por Mika, 1983-
    Publicado 2015
    Tabla de Contenidos: “…Talk About You, All She Wants ; Last Party ; Good Guys ; Oh Girl, You're the Devil ; No Place In Heaven; Staring At the Sun; Hurts ; Good Wife ; Rio ; Ordinary Man; Promiseland ; Porcelain ; Good Guys [Night Time Mix]…”
    CDROM
  9. 9
    por Tolin, David F.
    Publicado 2014
    Tabla de Contenidos: “…-- Meet the bad guys -- Meet the good guys : strategies for beating hoarding -- How did this happen? …”
    Libro electrónico
  10. 10
    Publicado 2018
    Tabla de Contenidos: “…Introduction: Good-ish people -- Part I: Builders activate a growth mindset -- Stumbling upward -- One of the "good guys" -- If you are not part of the problem, you cannot be part of the solution -- Part II: Builders see and use their ordinary privilege -- Knowing it when you don't see it -- The power of ordinary privilege -- Part III: Builders opt for willful awareness -- Keep your eyes open, anyway -- Look out for these four "good" intentions -- Part IV: Builders engage -- Be inclusive -- Steer the conversation -- Educate and occasionally confront others -- Show meaningful support…”
    Libro electrónico
  11. 11
    por Markos, Louis
    Publicado 2010
    Tabla de Contenidos: “…Fractured fairy tales and the cult of the ugly ; The Space Trilogy I : the beauty of hierarchy ; The Space Trilogy II : the beauty of the normal ; Narnia I : the beauty of complementarity ; Narnia II : the beauty of light and truth ; Till We Have Faces : the beauty of beauty -- Part II. The good guys and the bad guys. The nature of good and evil ; Further up and further down ; Heroes and villains ; Courage along the road ; The heirs of Nietzsche -- Part III. …”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  12. 12
    Publicado 2012
    Tabla de Contenidos: “…Intro -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I: Casing the Establishment -- Case Study -- IAAAS-It's All About Anonymity, Stupid -- Tor-menting the Good Guys -- 1 Footprinting -- What is Footprinting? …”
    Libro electrónico
  13. 13
    Tabla de Contenidos: “….; Other Survival Skills That Consultants Cannot Supply; Bad Reason #2: To Provide or Repair a Skill or Knowledge that Cannot Be Trained; Leadership: An Untrainable Skill; Personality Theory; Emotional Intelligence Theory; The Faulty Mechanics of Leadership Training; Other Untrainable Skills; Bad Reason #3: To Validate an Initiative that a Company Already Plans on Doing; Consultants as the Bad Guys; Consultants as the Good Guys…”
    Libro electrónico
  14. 14
    por Bauer, Michael D.
    Publicado 2005
    Tabla de Contenidos: “…Deleting Unnecessary User Accounts and Restricting Shell AccessRestricting Access to Known Users; Running Services in chrooted Filesystems; Minimizing Use of SUID root; Identifying and dealing with SUID root files; Using su and sudo; Using su; Using sudo; Configuring, Managing, and Monitoring Logs; Every System Can Be Its Own Firewall: Using iptables for Local Security; Using iptables: Preparatory steps; How netfilter works; Using iptables; Checking Your Work with Scanners; Types of scans and their uses; Why we (good guys) scan; nmap, world champion port scanner; Getting and installing nmap…”
    Libro electrónico
  15. 15
    por Hall, Liz, 1964-
    Publicado 2013
    Tabla de Contenidos: “…Making the business case for mindfulnessRunning mindfulness programmes; 11 The FEEL model; FEEL: a model for applying mindfulness; The model; Client issues; 12 Stress, anxiety, depression and work-life balance; The good guy and the bad guy; How stress affects us; Approach and avoidance orientation; Discrepancy-based processing; How mindfulness can help; Remedial coaching; The great god of busyness; 13 Resilience, happiness and wellbeing; Definitions; What makes us resilient?…”
    Libro electrónico
  16. 16
    Publicado 2023
    Tabla de Contenidos: “…Chapter 13 Selling to the Good Guys-Regulation, Self-Criticism, and "Clean" Offensive Cybertechnology -- The Israeli regulator -- Offensive cyber as a geopolitical tool -- Final reflections -- Section 4 Building a Cyberstate -- Chapter 14 The Israeli Silicon Valley-Small State, Big Data -- Chapter 15 Unit 8200-Secrets of the IDF's Success -- "We've got to go up a notch" -- The story of Unit 8200 -- Unit 81: Making the impossible, possible -- Cyberintelligence: Challenges and opportunities -- Building the Israeli military's cybersecurity apparatus -- The ARAM Course -- From offense to defense -- The key to success -- Overcoming any obstacle -- The old boys' club -- Closed club? …”
    Libro electrónico
  17. 17
    Publicado 2022
    Tabla de Contenidos: “…-- How to Prevent Social Engineering Attacks on Your Business -- UI and UX Design -- Internal Threats -- Hacktivism -- Chapter 8 Step 8: Build Redundancy and Resilience -- Understanding Data and Networks -- Building Capacity and Scalability with the Power of the Cloud -- Back It Up, Back It Up, Back It Up -- RAID -- What Ransomware Taught Business About Backups -- Business Continuity -- Disaster Recovery -- Chapter 9 Afterword -- Step 1 -- The Most Notorious Cyberattacker Was Actually a Con Man -- A Strong Security Culture Requires All Hands on Deck -- Hackers Are the Good Guys, Actually -- What Is Security Culture? -- What Makes a Good CISO? …”
    Libro electrónico
  18. 18
    Publicado 2013
    Tabla de Contenidos: “…-- Mitigating the Insider Threat -- Be Vigilant -- We've Covered -- Part IV: Final Thoughts -- Chapter 12: The Never-Ending Race -- A Short Review of the Book -- Predictions -- The Future of Malware -- The Future of Rootkits -- The Future of Botnets -- The Good Guys Are Busy Too -- The Adventure Has Just Begun -- We've Covered -- Appendix A: The Bootup Process -- The Windows Bootup Process -- BIOS-Based system -- EFI-Based System -- Appendix B: Useful Links -- Vulnerability Information -- Free Online Security Products -- Free File Scanner and Analysis Tools -- Web Security -- Malware Trackers -- Other Important Links -- Glossary -- Index…”
    Libro electrónico
  19. 19
    Publicado 2023
    Tabla de Contenidos: “…Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Environmental problems caused by humans -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- 2 Personal Cybersecurity -- Chapter 1 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment -- Your work environment…”
    Libro electrónico
  20. 20
    Cybersecurity
    Cybersecurity For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Malvertising -- Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Man-made environmental problems -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- Part 2 Improving Your Own Personal Security -- Chapter 4 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment…”
    Libro electrónico