Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,716
- Application software 1,430
- Engineering & Applied Sciences 1,425
- Management 1,220
- Computer Science 958
- Computer programs 908
- Computer networks 883
- Data processing 880
- Computer software 661
- Security measures 654
- Design 634
- Computer security 607
- Artificial intelligence 591
- Cloud computing 591
- Web sites 554
- Operating systems (Computers) 548
- Python (Computer program language) 545
- Web site development 514
- Database management 496
- Examinations 492
- Programming 490
- Computer programming 485
- Computer graphics 463
- Digital techniques 448
- Photography 436
- Java (Computer program language) 412
- Business & Economics 395
- Electrical & Computer Engineering 395
- Information technology 388
- Certification 372
-
2101Publicado 2024Tabla de Contenidos: “…-- Port scanning issues -- Scanning countermeasures -- Introducing the Nmap network scanning tool -- Controlling Nmap scan speeds -- Outputting results -- The NSE -- The Nmap GUI -- Mapping the network -- Lab - Scanning and enumeration -- Summary -- Assessment -- Answer -- Chapter 4: Ethical Hacking Vulnerability Assessments and Threat Modeling -- Vulnerability assessment concepts -- Explaining vulnerability assessments -- Types of vulnerability assessments -- Vulnerability assessment life cycle -- Vulnerability scanning tools -- Introducing the Nessus vulnerability scanner -- Best practices for vulnerability assessments -- Vulnerability assessment reports -- The elements of threat modeling -- The finding -- The kill chain -- The single asset value -- The organizational asset value -- The estimated risk -- Threat modeling frameworks -- STRIDE -- PASTA -- VAST -- Attack trees -- CVSS -- Threat modeling tools -- Threat forecasting -- Phase 1 - Research -- Phase 2 - Implementation and analysis -- Phase 3 - Information sharing and building -- Threat model lab - personal computer security -- Summary -- Assessment -- Answer -- Part 2: Hacking Tools and Techniques -- Chapter 5: Hacking the Windows Operating System -- Technical requirements -- Exploiting the Windows OS -- Exploiting Windows device drivers -- Exploiting Windows networking -- Address Resolution Protocol -- Simple network management protocol -- Server Message Block -- NetBIOS -- Exploiting Windows authentication -- User authentication and movement -- Obtaining and extracting passwords -- Exploring password-cracking techniques -- Authentication spoofing -- Pulling Windows account names via null sessions -- Tools for pulling account names via null sessions -- Privilege elevation…”
Libro electrónico -
2102Publicado 2024“…The goal of the product management module is to walk through the product management life cycle, from inception to growth and launch, while taking customer feedback into consideration and implementing effective tools, processes, and determination to create a scalable product and manage it until its end of life. …”
Vídeo online -
2103
-
2104
-
2105
-
2106
-
2107
-
2108
-
2109
-
2110
-
2111
-
2112por Dlugacz, Yosef D., 1947-Tabla de Contenidos: “…The role of the manager -- Managing quality -- Information and prioritization -- Managing quality data -- Using quality tools and statistical methods for data analysis -- Translating information into action -- Working with guidelines -- Communication and accountability -- To err is indeed human -- Working together…”
Publicado 2004
Libro -
2113Publicado 2016“…Whether you are a business leader, aspiring entrepreneur, corporate innovator, growth investor, social impact change agent, or enterprising student, Design a Better Business is more than a book: it’s the comprehensive guide to the new tools, skills, and mindsets required to master ambiguity and create value from uncertainty…”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
2114
-
2115
-
2116
-
2117
-
2118
-
2119
-
2120por O'Connor, AnneMaterias:
Publicado 2007Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico