Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
421Publicado 1989Tabla de Contenidos: “…Die Noctuidae Griechenlands : mit einer Übersicht über die Fauna des Balkanraumes (Lepidoptera, Noctuidae) / Hermann Hacker…”
Libro -
422por Ayala, Luis. authorTabla de Contenidos: “…Chapter 1: Cyber-Physical Attack Recovery Procedures -- Chapter 2: Threats and Attack Detection -- Chapter 3: Prevent Hackers from Destroying a Boiler -- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel -- Chapter 5: Prevent Hackers from Destroying Chillers -- Chapter 6: Prevent Hackers from Destroying a Gas Fuel Train -- Chapter 7: Prevent Hackers from Destroying a Cooling Tower -- Chapter 8: Preventing Hackers from Destroying a Backup Generator -- Chapter 9: Prevent Hackers from Destroying Switchgear -- Chapter 10: Eight Steps to Defend Building Control Systems -- Chapter 11: Block Hacker Surveillance of your Buildings -- Chapter 12: Cyber-Physical Attack Recovery Procedures Template…”
Publicado 2016
Libro electrónico -
423Publicado 2004Tabla de Contenidos: “…An attack on the telephone network -- An attack on an ISP -- If he had just paid the rent -- Inside a hacker sting operation ... -- Identity theft -- Let's ask the hackers ... -- Why do hackers hack? …”
Libro electrónico -
424
-
425
-
426
-
427Publicado 2007Tabla de Contenidos: “…Bennett -- Philosophy as naive anthropology: comment on Bennett and Hacker / Daniel Dennett -- Putting consciousness back in the brain: reply to Bennett and Hacker, Philosophical foundations of neuroscience / John Searle -- The conceptual presuppositions of cognitive neuroscience: a reply to critics / Maxwell R. …”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
428por Wang, WallyTabla de Contenidos: “…Acknowledgments; Brief Contents; Contents in Detail; Introduction; PART 1: The Early Hackers; 1: The Hacker Mentality; Questioning Authority; Questioning Assumptions; Developing Values; The Three Stages of Hacking; 2: The First Hackers: The Phone Phreakers; A Short History of Phone Phreaking; Phone Phreaking Urban Legends; True and Verified Phone Phreaking Stories; Phone Phreaking Tools and Techniques; 3: Hacking People, Places, and Things; Social Engineering: The Art of Hacking People; Picking Locks; Exploring Urban Areas; Hacking the Airwaves; Hacking History (or, Hemp for Victory)…”
Publicado 2006
Libro electrónico -
429
-
430
-
431
-
432
-
433
-
434
-
435por Raymond, Eric S.Tabla de Contenidos: “…Appendix A. How to Become a HackerWhy This Document?; What Is a Hacker?; The Hacker Attitude; Basic Hacking Skills; Status in the Hacker Culture; The Hacker/Nerd Connection; Points for Style; Other Resources; Frequently Asked Questions; Appendix B. …”
Publicado 2001
Libro electrónico -
436
-
437
-
438
-
439
-
440por Carr, JeffreyTabla de Contenidos: “…Assessing the problem -- The rise of the non-state hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Non-state hackers and the social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policy makers from the field -- Afterword…”
Publicado 2010
Libro electrónico