Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
501Publicado 2018Tabla de Contenidos: “…Testing overview -- 1.3. Writing a Hacker News application -- 1.4. Vue testing overview -- Summary -- Chapter 2. …”
Libro electrónico -
502Publicado 2022Tabla de Contenidos: “…Hacking Rules: Facilitating Inclusivity in Hacker- and Makerspaces -- Part II Engaging Narratives -- 5. …”
Libro electrónico -
503Publicado 2007Tabla de Contenidos: “…IS audit process -- Technology and audit -- IS audit function knowledge -- IS risk and fundamental auditing concepts -- Standards and guidelines for IS auditing -- Internal controls concepts knowledge -- Risk management of the IS function -- Audit planning process -- Audit management -- Audit evidence process -- Audit reporting follow-up -- Information systems/information technology governance -- Management -- Strategic planning -- Management issues -- Support tools and frameworks -- Governance techniques -- Systems and infrastructure lifecycle management -- Information systems planning -- Information management and usage -- Development, acquisition, and maintenance of information systems -- Impact of information technology on the business processes and solutions -- Software development -- Audit and control of purchased packages -- Audit role in feasibility studies and conversions -- Audit and development of application controls -- Information technology service delivery and support -- Technical infrastructure -- Service center management -- Protection of information assets -- Information assets security management -- Logical information technology security -- Applied information technology security -- Physical and environmental security -- Business continuity and disaster recovery -- Protection of the information technology architecture and assets: disaster recovery planning -- Insurance -- Advanced is auditing -- Auditing e-commerce systems -- Auditing UNIX / LINUX -- Auditing windows -- Foiling the system hackers -- Investigating information technology fraud -- Appendices -- Appendix A Ethics and standards for the IS auditor -- Appendix B Audit program for application systems auditing -- Appendix C Logical access control audit program -- Appendix D Audit program for auditing UNIX / LINUX Environments -- Appendix E Audit program for auditing windows XP/2000 environments…”
Libro electrónico -
504Publicado 2018“…Become an ethical hacker that can hack and secure computer systems About This Video You will learn how networks work, basic network terminology, and how devices communicate with each other. …”
-
505Publicado 2016“…If a major event such as a terrorist attack, 7.2 earthquake, tsunami, or hacker attack were to disrupt business operations, would your organization be prepared to respond to the financial, political, and social impacts? …”
Libro electrónico -
506Publicado 2020“…The third edition of this popular cookbook provides more than 200 hands-on recipes that show you how to run this tiny low-cost computer with Linux; program it with Python; hook it up to sensors, motors, and Arduino boards; and even use it with the internet of things (IoT). Prolific hacker and author Simon Monk also teaches basic principles to help you use new technologies with the Raspberry Pi. …”
Libro electrónico -
507Publicado 2017“…In this video, the prolific hacker, author, and not-evil-at-all genius Dr. Simon Monk cooks up a batch of easy-to-follow lessons that will give all inventive souls the ingredients they need to start baking their own makings. …”
-
508por Bragg, Roberta“…Conrad, MCSE 2003, Server+, Certified Ethical Hacker James@accusource.net "Full of relevant and insightful information. …”
Publicado 2005
Libro electrónico -
509por Rubini, Alessandro“…You don't have to be a kernel hacker to understand and enjoy this book; all you need is an understanding of C and some background in Unix system calls. …”
Publicado 2001
Libro electrónico -
510por Spivey, Mark D.“…Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. …”
Publicado 2006
Libro electrónico -
511Publicado 2020“…It's everything an ethical hacker needs to know about a SQL injection attack. …”
-
512Publicado 2019“…Penetrationstests mit mimikatz von Pass-the-Hash über Kerberoasting bis hin zu Golden Tickets Funktionsweise und Schwachstellen der Windows Local Security Authority (LSA) und des Kerberos-Protokolls Alle Angriffe leicht verständlich und Schritt für Schritt erklärt mimikatz ist ein extrem leistungsstarkes Tool für Angriffe auf das Active Directory. Hacker können damit auf Klartextpasswörter, Passwort-Hashes sowie Kerberos Tickets zugreifen, ihre Rechte in fremden Systemen ausweiten und so die Kontrolle über ganze Firmennetzwerke übernehmen. …”
Libro electrónico -
513Publicado 2018“…Study smarter and pass your ITIL, A+, Network+, Security+, Certified Ethical Hacker (CEH), CISSP, or other exams easier About This Video This course increases the odds of success for those who have failed on previous attempts on their A+, Network+, Security+, CSA+, ITIL, CEH, or CISSP exams. …”
-
514Publicado 2012“…Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them. …”
Libro electrónico -
515Publicado 2024“…Überall im Internet sind Unternehmen und böswillige Hacker auf Ihre Daten aus. Hier lernen Sie anhand leicht verständlicher Schritt-für-Schritt-Anleitungen, wie Sie Ihr System mit einer Firewall und zusätzlichen Tools absichern, Ihre Daten und E-Mails verschlüsseln, privat surfen, eine sichere VPN-Verbindung herstellen, eine eigene private Cloud betreiben und vieles mehr. …”
Libro electrónico -
516
-
517por Flickenger, RobTabla de Contenidos: “…Contents; Credits; About the Author; Contributors; Acknowledgments; How to Become a Hacker; The Hacker Attitude; 1. The world is full of fascinating problems waiting to be solved.; 2. …”
Publicado 2003
Libro electrónico -
518por Mansourov, NikolaiTabla de Contenidos: “…Why Hackers Are Repeatedly Successful; 1.3. What are the challenges in defending cybersystems?…”
Publicado 2011
Libro electrónico -
519Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Introduction to Network Security -- Murphy's law -- Hackers (and their types) defined -- Hacker tools -- The hacking process -- Ethical hacking issues -- Current technologies -- Recent events and statistics of network attacks -- Our defense -- Security for individuals versus companies -- Wi-Fi vulnerabilities -- Knowns and unknowns -- False positives -- Mitigation against threats -- Building an assessment -- Summary -- References -- Chapter 2: Sniffing the Network -- What is network sniffing? …”
Libro electrónico -
520por Hoffman, Daniel 1972-“…Now, a certified ethical hacker explains in this book why this must change and how to change it. …”
Publicado 2007
Libro electrónico