Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
381
-
382Publicado 2019Tabla de Contenidos: “…Urban Communities Re-Appropriating Their City -- Removing Barriers for Citizen Participation to Urban Innovation -- Part III: Hackers and Institutions -- Working in Beta: Testing Urban Experiments and Innovation Policy within Dublin City Council -- Reinventing the Rules: Emergent Gameplay for Civic Learning -- Data Flow in the Smart City: Open Data vs. …”
Libro electrónico -
383Publicado 2020Tabla de Contenidos: “…PGINA LEGAL -- NDICE -- PREFACIO -- ENTREVISTA A GIANNI VATTIMO -- ENTREVISTA A DINA PICOTTI -- ENTREVISTA A RAL FORNET-BETANCOURT -- ENTREVISTA A CARLA CORDUA -- ENTREVISTA A JAVIER SAN MARTN -- ENTREVISTA A PETER HACKER -- ENTREVISTA A ALICE CRARY -- ENTREVISTA A PETER TRAWNY -- ENTREVISTA A JEAN-LUC MARION -- SOBRE LOS ENTREVISTADOS…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
384por Lynn, Jonathan
Publicado 1987Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca Universitat Ramon Llull)Libro -
385Publicado 2018Tabla de Contenidos: “…Analyzing the Frequency of Letters in Text -- Matching Letter Frequencies -- Source Code for Matching Letter Frequencies -- Storing the Letters in ETAOIN Order -- Counting the Letters in a Message -- Getting the First Member of a Tuple -- Ordering the Letters in the Message by Frequency -- Calculating the Frequency Match Score of the Message -- Summary -- Practice Questions -- Chapter 20: Hacking the Vigenère Cipher -- Using a Dictionary Attack to Brute-Force the Vigenère Cipher -- Source Code for the Vigenère Dictionary Hacker Program -- Sample Run of the Vigenère Dictionary Hacker Program -- About the Vigenère Dictionary Hacker Program -- Using Kasiski Examination to Find the Key's Length -- Source Code for the Vigenère Hacking Program -- Sample Run of the Vigenère Hacking Program -- Importing Modules and Setting Up the main() Function -- Finding Repeated Sequences -- Calculating the Factors of the Spacings -- Finding the Most Likely Key Lengths -- Getting Letters Encrypted with the Same Subkey -- Attempting Decryption with a Likely Key Length -- Returning the Hacked Message -- Calling the main() Function -- Modifying the Constants of the Hacking Program -- Summary -- Practice Questions -- Chapter 21: The One-Time Pad Cipher -- The Unbreakable One-Time Pad Cipher -- Summary -- Practice Questions -- Chapter 22: Finding and Generating Prime Numbers -- What Is a Prime Number? …”
Libro electrónico -
386Publicado 2019Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- About the Author -- About the Technical Reviewer -- Brief Contents -- Contents in Detail -- Foreword by Michiel Prins and Jobert Abma -- Acknowledgments -- Introduction -- Who Should Read This Book -- How to Read This Book -- What's in This Book -- A Disclaimer About Hacking -- 1 Bug Bounty Basics -- Vulnerabilities and Bug Bounties -- Client and Server -- What Happens When You Visit a Website -- HTTP Requests -- Summary -- 2 Open Redirect -- How Open Redirects Work -- Shopify Theme Install Open Redirect -- Shopify Login Open Redirect -- HackerOne Interstitial Redirect -- Summary -- 3 HTTP Parameter Pollution -- Server-Side HPP -- Client-Side HPP -- HackerOne Social Sharing Buttons -- Twitter Unsubscribe Notifications -- Twitter Web Intents -- Summary -- 4 Cross-Site Request Forgery -- Authentication -- CSRF with GET Requests -- CSRF with POST Requests -- Defenses Against CSRF Attacks -- Shopify Twitter Disconnect -- Change Users Instacart Zones -- Badoo Full Account Takeover -- Summary -- 5 HTML Injection and Content Spoofing -- Coinbase Comment Injection Through Character Encoding -- HackerOne Unintended HTML Inclusion -- HackerOne Unintended HTML Include Fix Bypass -- Within Security Content Spoofing -- Summary -- 6 Carriage Return Line Feed Injection -- HTTP Request Smuggling -- v.shopify.com Response Splitting -- Twitter HTTP Response Splitting -- Summary -- 7 Cross-Site Scripting -- Types of XSS -- Shopify Wholesale -- Shopify Currency Formatting -- Yahoo! …”
Libro electrónico -
387
-
388
-
389
-
390
-
391Publicado 2011Tabla de Contenidos: “…Introduction to computer security -- Networks and the internet -- Cyber stalking, fraud, and abuse -- Denial of service attacks -- Malware -- Techniques used by hackers -- Industrial espionage in cyberspace -- Encryption -- Computer security software -- Security policies -- Network scanning and vulnerability scanning -- Cyber terrorism and information warfare -- Cyber detective -- Introduction to forensics…”
Libro electrónico -
392Publicado 2022“…Almost everything is visible to the hacker: our data, confidential files, photographs ... almost everything. …”
Grabación no musical -
393
-
394
-
395
-
396
-
397por Cárcamo Aguad, RodrigoTabla de Contenidos: “…Intro -- Prefacio -- Entrevista a Gianni Vattimo -- Entrevista a Dina Picotti -- Entrevista a Raúl Fornet-Betancourt -- Entrevista a Carla Cordua -- Entrevista a Javier San Martín -- Entrevista a Peter Hacker -- Entrevista a Alice Crary -- Entrevista a Peter Trawny -- Entrevista a Jean-Luc Marion -- Sobre los entrevistados…”
Publicado 2022
Libro electrónico -
398Publicado 2018“…Als von der US-Regierung ehemals meistgesuchter Computer-Hacker kennt er alle Schwachstellen und Sicherheitslücken des digitalen Zeitalters. …”
Libro electrónico -
399por Morales i Gras, JordiTabla de Contenidos: “…Intro -- Un mundo de hackers -- Bibliografía -- Una ciencia para una era -- Bibliografía -- Viejos sueños para nuevos tiempos -- Bibliografía -- Investigación y autonomía en la era de los datos masivos -- Bibliografía -- Clasificar, predecir, describir y explicar en el mundo digital -- Bibliografía -- El científico social ante el mundo digital -- Bibliografía…”
Publicado 2022
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
400por Löning, MadeleineTabla de Contenidos: “…Anhang -- 7.1 Sequenzprotokoll Bedwin Hacker (2003) -- 7.2 Screenshots Bedwin Hacker (2003) -- 7.3 Musikprotokoll Bedwin Hacker (2003)…”
Publicado 2022
Libro electrónico