Mostrando 421 - 440 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 421
    Publicado 1989
    Tabla de Contenidos: “…Die Noctuidae Griechenlands : mit einer Übersicht über die Fauna des Balkanraumes (Lepidoptera, Noctuidae) / Hermann Hacker…”
    Libro
  2. 422
    por Ayala, Luis. author
    Publicado 2016
    Tabla de Contenidos: “…Chapter 1: Cyber-Physical Attack Recovery Procedures -- Chapter 2: Threats and Attack Detection -- Chapter 3: Prevent Hackers from Destroying a Boiler -- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel -- Chapter 5: Prevent Hackers from Destroying Chillers -- Chapter 6: Prevent Hackers from Destroying a Gas Fuel Train -- Chapter 7: Prevent Hackers from Destroying a Cooling Tower -- Chapter 8: Preventing Hackers from Destroying a Backup Generator -- Chapter 9: Prevent Hackers from Destroying Switchgear -- Chapter 10: Eight Steps to Defend Building Control Systems -- Chapter 11: Block Hacker Surveillance of your Buildings -- Chapter 12: Cyber-Physical Attack Recovery Procedures Template…”
    Libro electrónico
  3. 423
    Publicado 2004
    Tabla de Contenidos: “…An attack on the telephone network -- An attack on an ISP -- If he had just paid the rent -- Inside a hacker sting operation ... -- Identity theft -- Let's ask the hackers ... -- Why do hackers hack? …”
    Libro electrónico
  4. 424
    por Rivers, Pitt
    Publicado 1971
    Libro
  5. 425
    Publicado 1929
    Libro
  6. 426
    por Haydn, Joseph, 1732-1809
    Publicado 1998
    CDROM
  7. 427
    Publicado 2007
    Tabla de Contenidos: “…Bennett -- Philosophy as naive anthropology: comment on Bennett and Hacker / Daniel Dennett -- Putting consciousness back in the brain: reply to Bennett and Hacker, Philosophical foundations of neuroscience / John Searle -- The conceptual presuppositions of cognitive neuroscience: a reply to critics / Maxwell R. …”
    Libro
  8. 428
    por Wang, Wally
    Publicado 2006
    Tabla de Contenidos: “…Acknowledgments; Brief Contents; Contents in Detail; Introduction; PART 1: The Early Hackers; 1: The Hacker Mentality; Questioning Authority; Questioning Assumptions; Developing Values; The Three Stages of Hacking; 2: The First Hackers: The Phone Phreakers; A Short History of Phone Phreaking; Phone Phreaking Urban Legends; True and Verified Phone Phreaking Stories; Phone Phreaking Tools and Techniques; 3: Hacking People, Places, and Things; Social Engineering: The Art of Hacking People; Picking Locks; Exploring Urban Areas; Hacking the Airwaves; Hacking History (or, Hemp for Victory)…”
    Libro electrónico
  9. 429
    Libro
  10. 430
    por Gardner, Arthur
    Publicado 1973
    Libro
  11. 431
    por Pasquali, Giuseppe
    Publicado 1964
    Libro
  12. 432
    por Hausmann, Irmgard
    Publicado 1972
    Libro
  13. 433
    Publicado 1951
    Libro
  14. 434
    por Walton, Paul H.
    Publicado 1985
    Libro
  15. 435
    por Raymond, Eric S.
    Publicado 2001
    Tabla de Contenidos: “…Appendix A. How to Become a HackerWhy This Document?; What Is a Hacker?; The Hacker Attitude; Basic Hacking Skills; Status in the Hacker Culture; The Hacker/Nerd Connection; Points for Style; Other Resources; Frequently Asked Questions; Appendix B. …”
    Libro electrónico
  16. 436
    por Smith, E. Baldwin
    Publicado 1978
    Libro
  17. 437
    por Aubert, Marcel, 1884-1962
    Publicado 1972
    Libro
  18. 438
    por Rivoira, G. T. 1849-1919
    Publicado 1975
    Libro
  19. 439
    Publicado 1968
    Libro
  20. 440
    por Carr, Jeffrey
    Publicado 2010
    Tabla de Contenidos: “…Assessing the problem -- The rise of the non-state hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Non-state hackers and the social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policy makers from the field -- Afterword…”
    Libro electrónico