Mostrando 341 - 360 Resultados de 942 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 341
    Publicado 2016
    Materias:
    Libro electrónico
  2. 342
    Publicado 2011
    Materias:
    Libro electrónico
  3. 343
    Publicado 2016
    Libro electrónico
  4. 344
    Publicado 2016
    “…Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackers…”
    Libro electrónico
  5. 345
    Publicado 2018
    Materias: “…Hackers Handbooks, manuals, etc…”
    Video
  6. 346
    Publicado 2019
    “…A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key Features Employ advanced pentesting techniques with Kali Linux to build highly secured systems Discover various stealth techniques to remain undetected and defeat modern infrastructures Explore red teaming techniques to exploit secured environment Book Description This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. …”
    Libro electrónico
  7. 347
    Publicado 2016
    “…Employs the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. In this module first,you'll be introduced to Kali's top ten tools and other useful reporting tools. …”
    Libro electrónico
  8. 348
    Publicado 2019
    Libro
  9. 349
    Publicado 2019
    991005299249706719
  10. 350
    por Vyncke, Eric, Paggen, Christopher
    Publicado 2008
    “…What hackers know about your switches…”
    Libro electrónico
  11. 351
    por Dreyfus, Suelette
    Publicado 2011
    Materias: “…Computer hackers Australia Biography…”
    Libro
  12. 352
    por Pauli, Joshua J.
    Publicado 2013
    Tabla de Contenidos: “…Spidering with BurpAutomated Spidering; Manual Spidering; Running Burp Spider; Web Application Scanning; What a Scanner Will Find; What a Scanner Won't Find; Scanning with ZED Attack Proxy (ZAP); Configuring ZAP; Running ZAP; Reviewing ZAP Results; ZAP Brute Force; Scanning with Burp Scanner; Configuring Burp Scanner; Running Burp Scanner; Reviewing Burp Scanner Results; Chapter 4: Web Application Exploitation with Injection; Introduction; SQL Injection Vulnerabilities; SQL Interpreter; SQL for Hackers; SQL Injection Attacks; Finding the Vulnerability; Bypassing Authentication…”
    Libro electrónico
  13. 353
    Publicado 2013
    Materias:
    Libro electrónico
  14. 354
    Publicado 2021
    Materias:
    Libro electrónico
  15. 355
    Publicado 2021
    Tabla de Contenidos: “…-- Cybersecurity Goals -- Adopting the Hacker Mindset -- Ethical Hacking -- Reasons for Penetration Testing -- Benefits of Penetration Testing -- Regulatory Requirements for Penetration Testing -- Who Performs Penetration Tests? …”
    Libro electrónico
  16. 356
    Publicado 2012
    Materias:
    Video
  17. 357
    Publicado 2009
    Materias:
    Libro electrónico
  18. 358
  19. 359
  20. 360