Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
181
-
182
-
183
-
184
-
185
-
186Publicado 2020“…The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. …”
Libro electrónico -
187Publicado 2021Libro electrónico
-
188
-
189
-
190
-
191
-
192Publicado 2022Materias:Libro electrónico
-
193
-
194
-
195Publicado 2003Materias: “…Computer hackers Fiction…”
Libro electrónico -
196Publicado 2024Tabla de Contenidos: “…-- Motive -- Means -- Opportunity -- Types and profiles of attackers and defenders -- Black hat hackers -- Script kiddies -- Hacktivists -- Cyber terrorists/cyber warriors -- Cyber criminals -- White hat hackers -- Attack targets and types -- Network -- Application -- Host -- The anatomy of an attack -- Reconnaissance -- Weaponization -- Delivery -- Exploitation -- Installation -- Command and control -- Actions on objectives -- Ethical hacking and penetration testing -- Defensive technologies -- Lab - setting up the testing lab -- Setting up VirtualBox -- Setting up Kali Linux -- Setting up vulnerable hosts -- Configuring the vulnerable Windows host -- Setting up the vulnerable Linux host -- Final checks -- Summary -- Assessment -- Answers -- Chapter 2: Ethical Hacking Footprinting and Reconnaissance -- Technical requirements -- What is footprinting and reconnaissance? …”
Libro electrónico -
197
-
198
-
199Publicado 2022“…The short life of hacker Aaron Swartz, who died by suicide on 11 January 2013, has many incredible aspects. …”
Libro electrónico -
200Publicado 2000“…Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. …”
Libro electrónico