Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,793
- Management 1,667
- Engineering & Applied Sciences 1,605
- Application software 1,579
- History 1,194
- Computer networks 1,119
- Computer Science 1,052
- Data processing 993
- Computer programs 871
- Security measures 859
- Design 763
- Examinations 749
- Computer security 733
- Cloud computing 720
- Database management 715
- Operating systems (Computers) 661
- Programming 641
- Python (Computer program language) 637
- Java (Computer program language) 633
- Web site development 624
- Research 602
- Computer software 582
- Web sites 582
- Certification 578
- Education 575
- Information technology 573
- Computer programming 566
- Artificial intelligence 555
- Photography 546
- Digital techniques 530
-
381Publicado 2014Libro electrónico
-
382
-
383
-
384
-
385Publicado 2012Libro electrónico
-
386
-
387por Cover, Robert M.
Publicado 2002Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
388Publicado 2013Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
389Publicado 2014Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
390
-
391Publicado 2010Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
392Publicado 2014Tabla de Contenidos: “…Cover; Table of Contents; Series editor's foreword; Introduction. …”
Libro electrónico -
393Publicado 2016Tabla de Contenidos: “…Front Cover -- Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity -- Copyright -- Dedication -- Contents -- Biography -- Foreword -- Preface -- Acknowledgments -- Harris Corporation -- Chapter 1: The impact of Windows Command Line investigations -- Introduction -- Cybercrime Methods and Vulnerabilities -- Novel Vulnerabilities -- Cyber Criminals Use the Windows Command Line -- Turning the Tables -- Organization of the Book -- Chapter 1 Review -- Chapter 1 Summary Questions -- Additional Resources -- Chapter 2: Importance of digital evidence integrity -- Introduction -- The Importance of Digital Evidence Integrity -- Digital Integrity Mechanisms -- One-way cryptographic hashing -- Hashing static evidence -- Hashing volatile or live evidence -- Searching for specific evidence -- Hash types and origins -- Digital signatures -- Signature types and origins -- Trusted time stamping -- Summary -- Chapter 2 Review -- Chapter 2 Summary Questions -- Additional Resources -- Chapter 3: Windows Command Line Interface -- Introduction -- What is the Windows Command Line Interface? …”
Libro electrónico -
394
-
395Publicado 2014Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Mockito; Introduction; Adding Mockito to a project's classpath; Getting started with Mockito for JUnit; Getting started with Mockito for TestNG; Mockito best practices - test behavior not implementation; Adding Mockito hints to exception messages (JUnit) (Experimental); Adding additional Mockito warnings to your tests (JUnit) (Experimental); Chapter 2: Creating Mocks; Introduction; Creating mocks in code; Creating mocks with annotations…”
Libro electrónico -
396
-
397
-
398Publicado 2015Libro electrónico
-
399
-
400