Mostrando 461 - 480 Resultados de 942 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 461
    por Humphrey, Watts S., 1927-
    Publicado 1997
    “…By mastering PSP techniques early in their studies, students can avoid--or overcome--the popular "hacker" ethic that leads to so many bad habits. Employers will appreciate new hires prepared to do competent professional work without, as now is common, expensive retraining and years of experience…”
    Libro electrónico
  2. 462
    Publicado 2002
    “…The book documents Stallman's personal evolution from teenage misfit to prescient adult hacker to political leader and examines how that evolution has shaped the free software movement. …”
    Libro electrónico
  3. 463
    Publicado 2024
    “…MySQL for Data Engineering Learning Linux Hacker Style Coding Description: Extract MySQL data through queries and bash pipelines Dump query results to CSV files. …”
    Video
  4. 464
    Publicado 2006
    Tabla de Contenidos: “…Solidaridad virtualizada y virtualizante. El movimiento hacker y la sociedad de la informaciónCapítulo VII. …”
    Libro electrónico
  5. 465
    Publicado 2014
    “…Verstehen Sie die menschliche Körpersprache und die verschiedenen Gesichtsausdrücke Lernen Sie, wie Hacker versuchen, Ihr Vertrauen zu gewinnen Erkennen Sie die Sicherheitslücken jenseits der IT-Infrastruktur Denken Sie wie ein Human Hacker Rekapitulieren Sie Fallstudien mit detaillierten Bildern typisch nonverbalen Verhaltens von Human Hackern Setzen Sie Ihre neu erworbenen Kenntnisse und Fertigkeiten der wachsenden Bedrohung durch Human Hacker entgegen Verbinden Sie die Wissenschaft der nonverbalen Kommunikation mit der Kunst des Social Engineering. …”
    Libro electrónico
  6. 466
    Publicado 2015
    “…Assemble a wireless attack toolkit and master the hacker’s weapons Effectively scan and enumerate WiFi networks and client devices Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite Develop and launch client-side attacks using Ettercap and the WiFi Pineapple Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS Exploit holes in WPA and WPA2 personal and enterprise security schemes Leverage rogue hotspots to deliver remote access software through fraudulent software updates Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic Capture and evaluate proprietary wireless technology with Software Defined Radio tools Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices Attack remote wireless networks using compromised Windows systems and built-in tools…”
    Libro electrónico
  7. 467
    Publicado 2024
    “…Beltrán shows how these hackers apply concepts from the code worlds to their lived experiences, deploying batches, loose coupling, iterative processing (looping), hacking, prototyping, and full-stack development in their daily social interactions—at home, in the workplace, on the dating scene, and in their understanding of the economy, culture, and geopolitics. …”
    Grabación no musical
  8. 468
    Publicado 2023
    “…It is also an essential resource to study for a variety of cybersecurity certifications, including Certified Ethical Hacker (CEH), CompTIA PenTest+, CEH Practical, Offensive Security Certified Professional (OSCP), Cisco CCIE Security, or CCNP Security. …”
    Video
  9. 469
    Publicado 2023
    “…In How I Rob Banks: And Other Such Places, renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. …”
    Grabación no musical
  10. 470
    Publicado 2022
    “…This course can also be a resource for anyone who is preparing for security certification like CompTIA Security+, Cisco CyberOps Associate, CISSP, CompTIA PenTest+, Certified Ethical Hacker (CEH), GIAC certifications, or others…”
    Video
  11. 471
    Publicado 2017
    “…Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services. …”
    Libro electrónico
  12. 472
    Publicado 2023
    “…This course is suitable for anyone looking to start their journey or anyone who is looking to get a security certification such as CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), and GIAC Information. Omar Santos takes you on a deep dive into Cybersecurity fundamentals with a training full of demos and real-world examples that allow you to test your skills in a practical scenario. …”
    Video
  13. 473
    Publicado 2008
    “…“Connectivity has sharply increased the need for secure, hacker-safe applications. By combining this CERT standard with other safety guidelines, customers gain all-round protection and approach the goal of zero-defect software.” …”
    Libro electrónico
  14. 474
    Publicado 2015
    “…The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. …”
    Libro electrónico
  15. 475
    Publicado 2018
    “…These web applications can provide hackers with the entry points they use to attack internal business systems, allowing the possibility of data theft or corruption. …”
    Video
  16. 476
    Publicado 2022
    “…About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Learn how to beat the security of custom websites having specific vulnerabilities In Detail In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. …”
    Video
  17. 477
    Publicado 2022
    “…In addition to this, you will learn how white hat hackers secure Windows OS by analyzing the malicious files and detecting the hacker's identity. …”
    Video
  18. 478
    Publicado 2015
    Tabla de Contenidos: “…""Give Some Arguments a Default Value""""Communicate from the Function""; ""Add a Score""; ""Let the User Quit""; ""The Complete Code""; ""Summary""; ""Week 3: Creating Word Games""; ""Project 6: Hacker Speaker: 1337 Sp34k3r""; ""Waiter, There's An Object In My String""; ""Dot Your Objects' Attributes""; ""Meet the List""; ""Go Through the Elements of a List""; ""Create Your Own List""; ""Create a List on Steroids""; ""Test Whether an Element's In a List""; ""Planning Your Elite Hacker Speaker""; ""Set Up Your File""; ""Make Code Letter Substitutions""; ""Replace a Letter""…”
    Libro electrónico
  19. 479
    Publicado 2016
    Tabla de Contenidos: “…Making contact to molecular layers : linking large ensembles of molecules to the outside world / Christina A. Hacker, Sujitra Pookpanratana, Mariona Coll, and Curt A. …”
    Libro electrónico
  20. 480
    Publicado 2014
    Tabla de Contenidos: “…Steam ; The breakthrough ; Critical mass ; Breakout ; Hackers -- The voyage to Altair. Uncle Sol's boys ; Going for broke ; All hell breaks loose ; Putting it together ; The competition ; The fall -- The miracle makers. …”
    Libro electrónico