Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
441
-
442
-
443
-
444
-
445
-
446
-
447
-
448
-
449
-
450por Ayala, Luis. authorTabla de Contenidos: “…Chapter 1: Hacker Reconnaissance of a Hospital Network -- Chapter 2: How Hackers Gain Access to a Hospital Network -- Chapter 3: Active Medical Device Cyber-Attacks -- Chapter 4: Medical Facility Cyber-Physical Attacks -- Chapter 5: Hospital Insider Threat -- Chapter 6: Detection of Cyber-Attacks -- Chapter 7: Preventing Cyber-Attacks -- Chapter 8: Cyber-Attack Response and Recovery Planning -- Chapter 9: Appendix. …”
Publicado 2016
Libro electrónico -
451
-
452
-
453
-
454Publicado 2015“…Master the tactics and tools of the advanced persistent threat hacker In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. …”
Libro electrónico -
455
-
456
-
457
-
458
-
459
-
460