Mostrando 481 - 500 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.08s Limitar resultados
  1. 481
    por Creswell, K. A. C. 1879-1974
    Publicado 1979
    Libro
  2. 482
    Publicado 2022
    “…Almost everything is visible to the hacker: our data, confidential files, photographs ... almost everything. …”
    Grabación no musical
  3. 483
    por Bazin, Germain
    Publicado 1978
    Libro
  4. 484
    por Creswell, K. A. C. 1879-1974
    Publicado 1979
    Libro
  5. 485
    por Creswell, K. A. C. 1879-1974
    Publicado 1979
    Libro
  6. 486
  7. 487
    por Cárcamo Aguad, Rodrigo
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Prefacio -- Entrevista a Gianni Vattimo -- Entrevista a Dina Picotti -- Entrevista a Raúl Fornet-Betancourt -- Entrevista a Carla Cordua -- Entrevista a Javier San Martín -- Entrevista a Peter Hacker -- Entrevista a Alice Crary -- Entrevista a Peter Trawny -- Entrevista a Jean-Luc Marion -- Sobre los entrevistados…”
    Libro electrónico
  8. 488
    por Morales i Gras, Jordi
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Un mundo de hackers -- Bibliografía -- Una ciencia para una era -- Bibliografía -- Viejos sueños para nuevos tiempos -- Bibliografía -- Investigación y autonomía en la era de los datos masivos -- Bibliografía -- Clasificar, predecir, describir y explicar en el mundo digital -- Bibliografía -- El científico social ante el mundo digital -- Bibliografía…”
    Libro electrónico
  9. 489
    Publicado 2018
    “…Als von der US-Regierung ehemals meistgesuchter Computer-Hacker kennt er alle Schwachstellen und Sicherheitslücken des digitalen Zeitalters. …”
    Libro electrónico
  10. 490
    Publicado 2012
    Tabla de Contenidos: “…The national information infrastructure and the policymaking process -- Origins of the digital rights movement: The white paper and the Digital Millennium Copyright Act -- Part II -- Dmitry Sklyarov and the Advanced eBook Processor -- DeCSS: Origins and the Bunner Case -- DeSS continued: The hacker ethic and the Reimerdes Case -- iTunes hacks: Hacking as a tactic in the digital rights movement -- Structure and tactics of the digital rights movement…”
    Libro electrónico
  11. 491
    Publicado 2015
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - US Cybersecurity Jobs -- 1.1 - US cybersecurity job titles -- 1.2 - General "hacker" classifications -- 1.2.1 - White Hat Hacker -- 1.2.2 - Black Hat Hacker -- 1.2.3 - Gray Hat Hacker -- 1.2.4 - Blue Hat Hacker -- 1.2.5 - Blue and Red Teams -- 1.3 - The concept of "being bad to be good" -- 1.4 - Key penetration tester "knowledge, skills, and abilities" (KSA's) -- Chapter 2 - The US Cybersecurity Industry -- 2.1 - Current and expected growth of the cybersecurity industry -- 2.1.1 - Worldwide Cybersecurity Spending -- 2.1.2 - Growth Driver 1: Cybercrime -- 2.1.3 - Growth Driver 2: The Internet-of-Things (IoT) -- 2.1.4 - Growth Driver 3: Cybersecurity is Now a Main Street Issue -- 2.1.5 - Growth Driver 4: Regulatory Compliance -- 2.2 - Employment opportunities -- 2.2.1 - Private Sector Demand -- 2.2.2 - Public Sector Demand -- 2.3 - 2015 Salary guide for cybersecurity professionals -- 2.4 - Entry-level positions -- Chapter 3 - 17 Tips on How to Land Your First Cybersecurity Job -- 3.1 - Tip 1: develop the right attitude -- 3.2 - Tip 2: curiosity is key -- 3.3 - Tip 3: develop technical prowess -- 3.4 - Tip 4: get involved in your local community -- 3.5 - Tip 5: take part in competitions -- 3.6 - Tip 6: join newsletters and read blogs -- 3.7 - Tip 7: master popular hacking tools -- 3.8 - Tip 8: become a Kali Linux power user -- 3.9 - Tip 9: create a home lab -- 3.10 - Tip 10: become a code monkey -- 3.11 - Tip 11: find bugs! …”
    Libro electrónico
  12. 492
    por Löning, Madeleine
    Publicado 2022
    Tabla de Contenidos: “…Anhang -- 7.1 Sequenzprotokoll Bedwin Hacker (2003) -- 7.2 Screenshots Bedwin Hacker (2003) -- 7.3 Musikprotokoll Bedwin Hacker (2003)…”
    Libro electrónico
  13. 493
    Publicado 2022
    Tabla de Contenidos: “…Table of Contents Defining Machine Learning Security Mitigating Risk at Training by Validating and Maintaining Datasets Mitigating Inference Risk by Avoiding Adversarial Machine Learning Attacks Considering the Threat Environment Keeping Your Network Clean Detecting and Analyzing Anomalies Dealing with Malware Locating Potential Fraud Defending against Hackers Considering the Ramifications of Deepfakes Leveraging Machine Learning against Hacking Embracing and Incorporating Ethical Behavior…”
    Libro electrónico
  14. 494
  15. 495
    Publicado 2018
    “…You'll learn in the context of building a Hacker News client app, which can view top stories in Hacker News, view comments of a story, and add stories to favorites. …”
    Libro
  16. 496
    por Pampín Quian, Alberto
    Publicado 2013
    “…Este es el relato de cómo se gestó la primera gran wikistory en la era de la sociedad red y uno de los acontecimientos más destacados del periodismo moderno: la historia del hacker australiano Julian Assange, de su organización WikiLeaks y de sus filtraciones masivas de documentos secretos. …”
    Texto completo en Odilo
    Otros
  17. 497
    Publicado 2018
    “…Go through the basics of network security and penetration testing to begin your journey to becoming an ethical hacker: a skilled professional who looks for weaknesses and vulnerabilities in software systems and uses this knowledge to defend them from external breaches. …”
    Video
  18. 498
    Publicado 2019
    “…Just because you have not been hit does not mean your data is safe, and hackers rely on their targets’ complacence to help maximize their haul. …”
    Libro electrónico
  19. 499
    Publicado 2019
    “…Learn everything you need to execute web application security assessments as a professional ethical hacker. About This Video It never gets boring, there will be always something interesting and new to learn. …”
    Video
  20. 500
    Publicado 2019
    Tabla de Contenidos: “…7 -- Hacking Relationships"Why I Will Never Have a Girlfriend"; The Origins of Pickup; Optimal: Two Bisexual HB10s; Nominal: The Challenge of Being Likable; Data and Dating; Yootling and Marriage; "You Are Doing It Wrong"; The Right Tools for the Job; 8 -- Hacking Meaning; The Ancient Stoics; Stoicism's Translators; The Stoic Life Hacker; Mindfulness and Its Translators; Apps, Gadgets, and Woo; Look Outside Yourself; Lost in Translation; 9 -- Blinkered; "I Choose Me"; Bending the Rules; The Blinkered Path; Notes; 1 -- Introduction; 2 -- The Life Hackers; 3 -- Hacking Time; 4 -- Hacking Motivation…”
    Libro electrónico