Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
21Publicado 2019“…Cybersecurity advice from the best hackers in the world…”
Libro electrónico -
22Publicado 2013“…In Hacker’s Delight, Second Edition , Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. …”
Libro electrónico -
23por Grimes, Roger A.“…Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. …”
Publicado 2019
Grabación no musical -
24
-
25
-
26
-
27Publicado 2005Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro
-
28
-
29
-
30por Gupta, Aditya. author“…As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely…”
Publicado 2019
Libro electrónico -
31Publicado 2015“…Bayesian Methods for Hackers illuminates Bayesian inference through probabilistic programming with the powerful PyMC language and the closely related Python tools NumPy, SciPy, and Matplotlib. …”
Libro electrónico -
32Publicado 2016“…The Car Hacker's Handbook shows how to identify vulnerabilities in modern automotive vehicles…”
Libro electrónico -
33Publicado 2019Tabla de Contenidos: “…Getting started with the basics -- Text manipulation -- Analyzing and managing networks -- Adding and removing software -- Controlling file and directory permissions -- Process management -- Managing user environment variables -- Bash scripting -- Compressing and archiving -- Filesystem and storage device management -- The logging system -- Using and abusing services -- Becoming secure and anonymous -- Understanding and inspecting wireless networks -- Managing the Linux Kernel and loadable Kernel models -- Automating tasks with job scheduling -- Python scripting basics for hackers…”
Libro electrónico -
34Publicado 2015Materias: “…Hackers Handbooks, manuals, etc…”
Libro electrónico -
35
-
36
-
37
-
38por Litchfield, David, 1975-Tabla de Contenidos: “…The Oracle® Hacker's Handbook: Hacking and Defending Oracle; Contents; Introduction; Chapter 1 Overview of the Oracle RDBMS; Architecture; Processes; The File System; The Network; Oracle Patching; Wrapping Up; Chapter 2 The Oracle Network Architecture; The TNS Protocol; Getting the Oracle Version; Wrapping Up; Chapter 3 Attacking the TNS Listener and Dispatchers; Attacking the TNS Listener; The Aurora GIOP Server; The XML Database; Wrapping Up; Chapter 4 Attacking the Authentication Process; How Authentication Works; Attacks Against the Crypto Aspects; Default Usernames and Passwords…”
Publicado 2007
Libro electrónico -
39por Miller, Charles, 1951-“…Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle those…”
Publicado 2009
Libro electrónico -
40por Alcorn, WadeMaterias: “…Computer hackers Handbooks, manuals, etc…”
Publicado 2014
Libro electrónico