Mostrando 501 - 520 Resultados de 942 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 501
    Publicado 2018
    Tabla de Contenidos: “…Testing overview -- 1.3. Writing a Hacker News application -- 1.4. Vue testing overview -- Summary -- Chapter 2. …”
    Libro electrónico
  2. 502
    Publicado 2022
    Tabla de Contenidos: “…Hacking Rules: Facilitating Inclusivity in Hacker- and Makerspaces -- Part II Engaging Narratives -- 5. …”
    Libro electrónico
  3. 503
    Publicado 2007
    Tabla de Contenidos: “…IS audit process -- Technology and audit -- IS audit function knowledge -- IS risk and fundamental auditing concepts -- Standards and guidelines for IS auditing -- Internal controls concepts knowledge -- Risk management of the IS function -- Audit planning process -- Audit management -- Audit evidence process -- Audit reporting follow-up -- Information systems/information technology governance -- Management -- Strategic planning -- Management issues -- Support tools and frameworks -- Governance techniques -- Systems and infrastructure lifecycle management -- Information systems planning -- Information management and usage -- Development, acquisition, and maintenance of information systems -- Impact of information technology on the business processes and solutions -- Software development -- Audit and control of purchased packages -- Audit role in feasibility studies and conversions -- Audit and development of application controls -- Information technology service delivery and support -- Technical infrastructure -- Service center management -- Protection of information assets -- Information assets security management -- Logical information technology security -- Applied information technology security -- Physical and environmental security -- Business continuity and disaster recovery -- Protection of the information technology architecture and assets: disaster recovery planning -- Insurance -- Advanced is auditing -- Auditing e-commerce systems -- Auditing UNIX / LINUX -- Auditing windows -- Foiling the system hackers -- Investigating information technology fraud -- Appendices -- Appendix A Ethics and standards for the IS auditor -- Appendix B Audit program for application systems auditing -- Appendix C Logical access control audit program -- Appendix D Audit program for auditing UNIX / LINUX Environments -- Appendix E Audit program for auditing windows XP/2000 environments…”
    Libro electrónico
  4. 504
    Publicado 2018
    “…Become an ethical hacker that can hack and secure computer systems About This Video You will learn how networks work, basic network terminology, and how devices communicate with each other. …”
    Video
  5. 505
    Publicado 2016
    “…If a major event such as a terrorist attack, 7.2 earthquake, tsunami, or hacker attack were to disrupt business operations, would your organization be prepared to respond to the financial, political, and social impacts? …”
    Libro electrónico
  6. 506
    Publicado 2020
    “…The third edition of this popular cookbook provides more than 200 hands-on recipes that show you how to run this tiny low-cost computer with Linux; program it with Python; hook it up to sensors, motors, and Arduino boards; and even use it with the internet of things (IoT). Prolific hacker and author Simon Monk also teaches basic principles to help you use new technologies with the Raspberry Pi. …”
    Libro electrónico
  7. 507
    Publicado 2017
    “…In this video, the prolific hacker, author, and not-evil-at-all genius Dr. Simon Monk cooks up a batch of easy-to-follow lessons that will give all inventive souls the ingredients they need to start baking their own makings. …”
    Video
  8. 508
    por Bragg, Roberta
    Publicado 2005
    “…Conrad, MCSE 2003, Server+, Certified Ethical Hacker James@accusource.net "Full of relevant and insightful information. …”
    Libro electrónico
  9. 509
    por Rubini, Alessandro
    Publicado 2001
    “…You don't have to be a kernel hacker to understand and enjoy this book; all you need is an understanding of C and some background in Unix system calls. …”
    Libro electrónico
  10. 510
    por Spivey, Mark D.
    Publicado 2006
    “…Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. …”
    Libro electrónico
  11. 511
    Publicado 2020
    “…It's everything an ethical hacker needs to know about a SQL injection attack. …”
    Video
  12. 512
    Publicado 2019
    “…Penetrationstests mit mimikatz von Pass-the-Hash über Kerberoasting bis hin zu Golden Tickets Funktionsweise und Schwachstellen der Windows Local Security Authority (LSA) und des Kerberos-Protokolls Alle Angriffe leicht verständlich und Schritt für Schritt erklärt mimikatz ist ein extrem leistungsstarkes Tool für Angriffe auf das Active Directory. Hacker können damit auf Klartextpasswörter, Passwort-Hashes sowie Kerberos Tickets zugreifen, ihre Rechte in fremden Systemen ausweiten und so die Kontrolle über ganze Firmennetzwerke übernehmen. …”
    Libro electrónico
  13. 513
    Publicado 2018
    “…Study smarter and pass your ITIL, A+, Network+, Security+, Certified Ethical Hacker (CEH), CISSP, or other exams easier About This Video This course increases the odds of success for those who have failed on previous attempts on their A+, Network+, Security+, CSA+, ITIL, CEH, or CISSP exams. …”
    Video
  14. 514
    Publicado 2012
    “…Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them. …”
    Libro electrónico
  15. 515
    Publicado 2024
    “…Überall im Internet sind Unternehmen und böswillige Hacker auf Ihre Daten aus. Hier lernen Sie anhand leicht verständlicher Schritt-für-Schritt-Anleitungen, wie Sie Ihr System mit einer Firewall und zusätzlichen Tools absichern, Ihre Daten und E-Mails verschlüsseln, privat surfen, eine sichere VPN-Verbindung herstellen, eine eigene private Cloud betreiben und vieles mehr. …”
    Libro electrónico
  16. 516
  17. 517
    por Flickenger, Rob
    Publicado 2003
    Tabla de Contenidos: “…Contents; Credits; About the Author; Contributors; Acknowledgments; How to Become a Hacker; The Hacker Attitude; 1. The world is full of fascinating problems waiting to be solved.; 2. …”
    Libro electrónico
  18. 518
    por Mansourov, Nikolai
    Publicado 2011
    Tabla de Contenidos: “…Why Hackers Are Repeatedly Successful; 1.3. What are the challenges in defending cybersystems?…”
    Libro electrónico
  19. 519
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Introduction to Network Security -- Murphy's law -- Hackers (and their types) defined -- Hacker tools -- The hacking process -- Ethical hacking issues -- Current technologies -- Recent events and statistics of network attacks -- Our defense -- Security for individuals versus companies -- Wi-Fi vulnerabilities -- Knowns and unknowns -- False positives -- Mitigation against threats -- Building an assessment -- Summary -- References -- Chapter 2: Sniffing the Network -- What is network sniffing? …”
    Libro electrónico
  20. 520
    por Hoffman, Daniel 1972-
    Publicado 2007
    “…Now, a certified ethical hacker explains in this book why this must change and how to change it. …”
    Libro electrónico