Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
481
-
482Publicado 2022“…Almost everything is visible to the hacker: our data, confidential files, photographs ... almost everything. …”
Grabación no musical -
483
-
484
-
485
-
486
-
487por Cárcamo Aguad, RodrigoTabla de Contenidos: “…Intro -- Prefacio -- Entrevista a Gianni Vattimo -- Entrevista a Dina Picotti -- Entrevista a Raúl Fornet-Betancourt -- Entrevista a Carla Cordua -- Entrevista a Javier San Martín -- Entrevista a Peter Hacker -- Entrevista a Alice Crary -- Entrevista a Peter Trawny -- Entrevista a Jean-Luc Marion -- Sobre los entrevistados…”
Publicado 2022
Libro electrónico -
488por Morales i Gras, JordiTabla de Contenidos: “…Intro -- Un mundo de hackers -- Bibliografía -- Una ciencia para una era -- Bibliografía -- Viejos sueños para nuevos tiempos -- Bibliografía -- Investigación y autonomía en la era de los datos masivos -- Bibliografía -- Clasificar, predecir, describir y explicar en el mundo digital -- Bibliografía -- El científico social ante el mundo digital -- Bibliografía…”
Publicado 2022
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
489Publicado 2018“…Als von der US-Regierung ehemals meistgesuchter Computer-Hacker kennt er alle Schwachstellen und Sicherheitslücken des digitalen Zeitalters. …”
Libro electrónico -
490Publicado 2012Tabla de Contenidos: “…The national information infrastructure and the policymaking process -- Origins of the digital rights movement: The white paper and the Digital Millennium Copyright Act -- Part II -- Dmitry Sklyarov and the Advanced eBook Processor -- DeCSS: Origins and the Bunner Case -- DeSS continued: The hacker ethic and the Reimerdes Case -- iTunes hacks: Hacking as a tactic in the digital rights movement -- Structure and tactics of the digital rights movement…”
Libro electrónico -
491Publicado 2015Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - US Cybersecurity Jobs -- 1.1 - US cybersecurity job titles -- 1.2 - General "hacker" classifications -- 1.2.1 - White Hat Hacker -- 1.2.2 - Black Hat Hacker -- 1.2.3 - Gray Hat Hacker -- 1.2.4 - Blue Hat Hacker -- 1.2.5 - Blue and Red Teams -- 1.3 - The concept of "being bad to be good" -- 1.4 - Key penetration tester "knowledge, skills, and abilities" (KSA's) -- Chapter 2 - The US Cybersecurity Industry -- 2.1 - Current and expected growth of the cybersecurity industry -- 2.1.1 - Worldwide Cybersecurity Spending -- 2.1.2 - Growth Driver 1: Cybercrime -- 2.1.3 - Growth Driver 2: The Internet-of-Things (IoT) -- 2.1.4 - Growth Driver 3: Cybersecurity is Now a Main Street Issue -- 2.1.5 - Growth Driver 4: Regulatory Compliance -- 2.2 - Employment opportunities -- 2.2.1 - Private Sector Demand -- 2.2.2 - Public Sector Demand -- 2.3 - 2015 Salary guide for cybersecurity professionals -- 2.4 - Entry-level positions -- Chapter 3 - 17 Tips on How to Land Your First Cybersecurity Job -- 3.1 - Tip 1: develop the right attitude -- 3.2 - Tip 2: curiosity is key -- 3.3 - Tip 3: develop technical prowess -- 3.4 - Tip 4: get involved in your local community -- 3.5 - Tip 5: take part in competitions -- 3.6 - Tip 6: join newsletters and read blogs -- 3.7 - Tip 7: master popular hacking tools -- 3.8 - Tip 8: become a Kali Linux power user -- 3.9 - Tip 9: create a home lab -- 3.10 - Tip 10: become a code monkey -- 3.11 - Tip 11: find bugs! …”
Libro electrónico -
492por Löning, MadeleineTabla de Contenidos: “…Anhang -- 7.1 Sequenzprotokoll Bedwin Hacker (2003) -- 7.2 Screenshots Bedwin Hacker (2003) -- 7.3 Musikprotokoll Bedwin Hacker (2003)…”
Publicado 2022
Libro electrónico -
493Publicado 2022Tabla de Contenidos: “…Table of Contents Defining Machine Learning Security Mitigating Risk at Training by Validating and Maintaining Datasets Mitigating Inference Risk by Avoiding Adversarial Machine Learning Attacks Considering the Threat Environment Keeping Your Network Clean Detecting and Analyzing Anomalies Dealing with Malware Locating Potential Fraud Defending against Hackers Considering the Ramifications of Deepfakes Leveraging Machine Learning against Hacking Embracing and Incorporating Ethical Behavior…”
Libro electrónico -
494
-
495Publicado 2018“…You'll learn in the context of building a Hacker News client app, which can view top stories in Hacker News, view comments of a story, and add stories to favorites. …”
Libro -
496por Pampín Quian, Alberto“…Este es el relato de cómo se gestó la primera gran wikistory en la era de la sociedad red y uno de los acontecimientos más destacados del periodismo moderno: la historia del hacker australiano Julian Assange, de su organización WikiLeaks y de sus filtraciones masivas de documentos secretos. …”
Publicado 2013
Texto completo en Odilo
Otros -
497Publicado 2018“…Go through the basics of network security and penetration testing to begin your journey to becoming an ethical hacker: a skilled professional who looks for weaknesses and vulnerabilities in software systems and uses this knowledge to defend them from external breaches. …”
-
498Publicado 2019“…Just because you have not been hit does not mean your data is safe, and hackers rely on their targets’ complacence to help maximize their haul. …”
Libro electrónico -
499Publicado 2019“…Learn everything you need to execute web application security assessments as a professional ethical hacker. About This Video It never gets boring, there will be always something interesting and new to learn. …”
-
500Publicado 2019Tabla de Contenidos: “…7 -- Hacking Relationships"Why I Will Never Have a Girlfriend"; The Origins of Pickup; Optimal: Two Bisexual HB10s; Nominal: The Challenge of Being Likable; Data and Dating; Yootling and Marriage; "You Are Doing It Wrong"; The Right Tools for the Job; 8 -- Hacking Meaning; The Ancient Stoics; Stoicism's Translators; The Stoic Life Hacker; Mindfulness and Its Translators; Apps, Gadgets, and Woo; Look Outside Yourself; Lost in Translation; 9 -- Blinkered; "I Choose Me"; Bending the Rules; The Blinkered Path; Notes; 1 -- Introduction; 2 -- The Life Hackers; 3 -- Hacking Time; 4 -- Hacking Motivation…”
Libro electrónico