Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
321
-
322Seguridad informática y Malwares Análisis de amenazas e implementación de contramedidas (2a edición)Publicado 2020Materias: Acceso con credenciales UPSA.
Libro electrónico -
323
-
324
-
325
-
326
-
327
-
328por Hadnagy, ChristopherTabla de Contenidos: “…SummaryChapter 8: Case Studies: Dissecting the Social Engineer; Mitnick Case Study 1: Hacking the DMV; Mitnick Case Study 2: Hacking the Social Security Administration; Hadnagy Case Study 1: The Overconfident CEO; Hadnagy Case Study 2: The Theme Park Scandal; Top-Secret Case Study 1: Mission Not Impossible; Top-Secret Case Study 2: Social Engineering a Hacker; Why Case Studies Are Important; Summary; Chapter 9: Prevention and Mitigation; Learning to Identify Social Engineering Attacks; Creating a Personal Security Awareness Culture…”
Publicado 2011
Libro electrónico -
329Publicado 2024Materias:Libro electrónico
-
330Publicado 2016“…The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book. …”
Libro electrónico -
331Publicado 2001“…Most hacking books focus on catching the hackers once they've enter…”
Libro electrónico -
332Publicado 2001Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro
-
333por Greenberg, Andy“…NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage--the largest, most devastating cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: Sandworm. …”
Publicado 2019
Libro -
334
-
335
-
336Publicado 2014Libro electrónico
-
337Publicado 2013Grabación no musical
-
338
-
339
-
340