Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,716
- Application software 1,430
- Engineering & Applied Sciences 1,425
- Management 1,220
- Computer Science 958
- Computer programs 908
- Computer networks 883
- Data processing 880
- Computer software 661
- Security measures 654
- Design 634
- Computer security 607
- Artificial intelligence 591
- Cloud computing 591
- Web sites 554
- Operating systems (Computers) 548
- Python (Computer program language) 545
- Web site development 514
- Database management 496
- Examinations 492
- Programming 490
- Computer programming 485
- Computer graphics 463
- Digital techniques 448
- Photography 436
- Java (Computer program language) 412
- Business & Economics 395
- Electrical & Computer Engineering 395
- Information technology 388
- Certification 372
-
2521
-
2522
-
2523
-
2524
-
2525
-
2526
-
2527por Kolodziej, Joanna“…Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java platform : Virtual machines, Languages, and Tools…”
Publicado 2014
Libro electrónico -
2528Publicado 2014“…Proceedings of the 6th International Workshop on Equation-Based Object-Oriented Modeling Languages and Tools…”
Libro electrónico -
2529por Das, Manuvir“…Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering…”
Publicado 2007
Libro electrónico -
2530por Bajracharya, Sushil“…Search-Driven Development: Users, Infrastructure, Tools, and Evaluation'11…”
Publicado 2011
Libro electrónico -
2531por Plümicke, Martin“…Proceedings of the 2013 International Conference on Principles and Practices of Programming on the Java Platform : Virtual Machines, Languages, and Tools…”
Publicado 2013
Libro electrónico -
2532Publicado 2021Materias:Libro electrónico
-
2533
-
2534Publicado 2020Materias: “…dynamic and interactive tool…”
Libro electrónico -
2535por Orpí, DanielMaterias:
Publicado 1994Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada)Libro -
2536Publicado 2020“…Getting clean data to reveal insights is essential, as directly jumping into data analysis without proper data cleaning may lead to incorrect results. This book shows you tools and techniques that you can apply to clean and handle data with Python. …”
Otros -
2537
-
2538
-
2539Publicado 2018Tabla de Contenidos: “…Code injection fundamentals - fine-tuning with BDF -- Trojan engineering with BDF and IDA -- Summary -- Questions -- Further reading -- Chapter 11: Bypassing Protections with ROP -- Technical requirements -- DEP and ASLR - the intentional and the unavoidable -- Understanding DEP -- Understanding ASLR -- Testing DEP protection with WinDbg -- Demonstrating ASLR on Kali Linux with C -- Introducing return-oriented programming -- Borrowing chunks and returning to libc - turning the code against itself -- The basic unit of ROP - gadgets -- Getting cozy with our tools - MSFrop and ROPgadget -- Metasploit Framework's ROP tool - MSFrop -- Your sophisticated ROP lab - ROPgadget -- Creating our vulnerable C program without disabling protections -- No PIE for you - compiling your vulnerable executable without ASLR hardening -- Generating a ROP chain -- Getting hands-on with the return-to-PLT attack -- Extracting gadget information for building your payload -- Finding the .bss address -- Finding a pop pop ret structure -- Finding addresses for system@plt and strcpy@plt functions -- Finding target characters in memory with ROPgadget and Python -- Go, go, gadget ROP chain - bringing it together for the exploit -- Finding the offset to return with gdb -- Writing the Python exploit -- Summary -- Questions -- Further reading -- Chapter 12: Fuzzing Techniques -- Technical requirements -- Network fuzzing - mutation fuzzing with Taof proxying -- Configuring the Taof proxy to target the remote service -- Fuzzing by proxy - generating legitimate traffic -- Hands-on fuzzing with Kali and Python -- Picking up where Taof left off with Python - fuzzing the vulnerable FTP server -- The other side - fuzzing a vulnerable FTP client -- Writing a bare-bones FTP fuzzer service in Python -- Crashing the target with the Python fuzzer -- Fuzzy registers - the low-level perspective…”
Libro electrónico -
2540Publicado 2017Tabla de Contenidos: “…-- Digital forensics methodology -- A brief history of digital forensics -- The need for digital forensics as technology advances -- Commercial tools available in the field of digital forensics -- Operating systems and open source tools for digital forensics -- Digital evidence and forensics toolkit Linux -- Computer Aided INvestigative Environment -- Kali Linux -- The need for multiple forensics tools in digital investigations -- Anti-forensics: threats to digital forensics -- Encryption -- Online and offline anonymity -- Summary -- Chapter 2: Installing Kali Linux -- Software version -- Downloading Kali Linux -- Installing Kali Linux -- Installing Kali Linux in VirtualBox -- Preparing the Kali Linux virtual machine -- Installing Kali Linux on the virtual machine -- Partitioning the disk -- Exploring Kali Linux -- Summary -- Chapter 3: Understanding Filesystems and Storage Media -- Storage media -- IBM and the history of storage media -- Removable storage media -- Magnetic tape drives -- Floppy disks -- Evolution of the floppy disk -- Optical storage media -- Compact disks -- Digital versatile disks -- Blu-ray disk -- Flash storage media -- USB flash drives -- Flash memory cards -- Hard disk drives -- IDE HDDs -- SATA HDDs -- Solid-state drives -- Filesystems and operating systems -- What about the data? …”
Libro electrónico