Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
461por Humphrey, Watts S., 1927-“…By mastering PSP techniques early in their studies, students can avoid--or overcome--the popular "hacker" ethic that leads to so many bad habits. Employers will appreciate new hires prepared to do competent professional work without, as now is common, expensive retraining and years of experience…”
Publicado 1997
Libro electrónico -
462Publicado 2002“…The book documents Stallman's personal evolution from teenage misfit to prescient adult hacker to political leader and examines how that evolution has shaped the free software movement. …”
Libro electrónico -
463Publicado 2024“…MySQL for Data Engineering Learning Linux Hacker Style Coding Description: Extract MySQL data through queries and bash pipelines Dump query results to CSV files. …”
Video -
464Publicado 2006Tabla de Contenidos: “…Solidaridad virtualizada y virtualizante. El movimiento hacker y la sociedad de la informaciónCapítulo VII. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
465Publicado 2014“…Verstehen Sie die menschliche Körpersprache und die verschiedenen Gesichtsausdrücke Lernen Sie, wie Hacker versuchen, Ihr Vertrauen zu gewinnen Erkennen Sie die Sicherheitslücken jenseits der IT-Infrastruktur Denken Sie wie ein Human Hacker Rekapitulieren Sie Fallstudien mit detaillierten Bildern typisch nonverbalen Verhaltens von Human Hackern Setzen Sie Ihre neu erworbenen Kenntnisse und Fertigkeiten der wachsenden Bedrohung durch Human Hacker entgegen Verbinden Sie die Wissenschaft der nonverbalen Kommunikation mit der Kunst des Social Engineering. …”
Libro electrónico -
466Publicado 2015“…Assemble a wireless attack toolkit and master the hacker’s weapons Effectively scan and enumerate WiFi networks and client devices Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite Develop and launch client-side attacks using Ettercap and the WiFi Pineapple Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS Exploit holes in WPA and WPA2 personal and enterprise security schemes Leverage rogue hotspots to deliver remote access software through fraudulent software updates Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic Capture and evaluate proprietary wireless technology with Software Defined Radio tools Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices Attack remote wireless networks using compromised Windows systems and built-in tools…”
Libro electrónico -
467Publicado 2024“…Beltrán shows how these hackers apply concepts from the code worlds to their lived experiences, deploying batches, loose coupling, iterative processing (looping), hacking, prototyping, and full-stack development in their daily social interactions—at home, in the workplace, on the dating scene, and in their understanding of the economy, culture, and geopolitics. …”
Grabación no musical -
468Publicado 2023“…It is also an essential resource to study for a variety of cybersecurity certifications, including Certified Ethical Hacker (CEH), CompTIA PenTest+, CEH Practical, Offensive Security Certified Professional (OSCP), Cisco CCIE Security, or CCNP Security. …”
Video -
469Publicado 2023“…In How I Rob Banks: And Other Such Places, renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. …”
Grabación no musical -
470Publicado 2022“…This course can also be a resource for anyone who is preparing for security certification like CompTIA Security+, Cisco CyberOps Associate, CISSP, CompTIA PenTest+, Certified Ethical Hacker (CEH), GIAC certifications, or others…”
Video -
471Publicado 2017“…Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services. …”
Libro electrónico -
472Publicado 2023“…This course is suitable for anyone looking to start their journey or anyone who is looking to get a security certification such as CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), and GIAC Information. Omar Santos takes you on a deep dive into Cybersecurity fundamentals with a training full of demos and real-world examples that allow you to test your skills in a practical scenario. …”
Video -
473Publicado 2008“…“Connectivity has sharply increased the need for secure, hacker-safe applications. By combining this CERT standard with other safety guidelines, customers gain all-round protection and approach the goal of zero-defect software.” …”
Libro electrónico -
474Publicado 2015“…The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. …”
Libro electrónico -
475Publicado 2018“…These web applications can provide hackers with the entry points they use to attack internal business systems, allowing the possibility of data theft or corruption. …”
Video -
476Publicado 2022“…About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Learn how to beat the security of custom websites having specific vulnerabilities In Detail In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. …”
Video -
477Publicado 2022“…In addition to this, you will learn how white hat hackers secure Windows OS by analyzing the malicious files and detecting the hacker's identity. …”
Video -
478Publicado 2015Tabla de Contenidos: “…""Give Some Arguments a Default Value""""Communicate from the Function""; ""Add a Score""; ""Let the User Quit""; ""The Complete Code""; ""Summary""; ""Week 3: Creating Word Games""; ""Project 6: Hacker Speaker: 1337 Sp34k3r""; ""Waiter, There's An Object In My String""; ""Dot Your Objects' Attributes""; ""Meet the List""; ""Go Through the Elements of a List""; ""Create Your Own List""; ""Create a List on Steroids""; ""Test Whether an Element's In a List""; ""Planning Your Elite Hacker Speaker""; ""Set Up Your File""; ""Make Code Letter Substitutions""; ""Replace a Letter""…”
Libro electrónico -
479Publicado 2016Tabla de Contenidos: “…Making contact to molecular layers : linking large ensembles of molecules to the outside world / Christina A. Hacker, Sujitra Pookpanratana, Mariona Coll, and Curt A. …”
Libro electrónico -
480Publicado 2014Tabla de Contenidos: “…Steam ; The breakthrough ; Critical mass ; Breakout ; Hackers -- The voyage to Altair. Uncle Sol's boys ; Going for broke ; All hell breaks loose ; Putting it together ; The competition ; The fall -- The miracle makers. …”
Libro electrónico