Mostrando 541 - 560 Resultados de 942 Para Buscar '"hacker"', tiempo de consulta: 0.10s Limitar resultados
  1. 541
    por Sun, Yiyi. author
    Publicado 2019
    “…Following examples of various apps, such as the counter app, to-do app, weather app, hacker news reader app, and blog app, you will have all the techniques for developing your AppRun apps including the line of business apps. …”
    Libro electrónico
  2. 542
    Publicado 2003
    Tabla de Contenidos: “…/ José Galindo Gómez -- Percepciones en Catalunya de las repercusiones de la IG: apunte de un debate ético / José Antonio Román Brugnoli y Joan Pujol Tarrés -- Ética Hacker y empresa: el reto de las TIC en los valores de empresa / Ramón Alcoberro -- L'ètica de les xarxes de telecomunicacions per cable i de banda ampla / Joan Francesc Fondevila i Gascón -- Acoso moral: ahogados en el trabajo / M. …”
    991009658840106719
  3. 543
    Publicado 2017
    “…If you’re just getting started with Perl, this is the book you want—whether you’re a programmer, system administrator, or web hacker. Nicknamed "the Llama" by two generations of users, this bestseller closely follows the popular introductory Perl course taught by the authors since 1991. …”
    Libro electrónico
  4. 544
    por Aebi, Delphine
    Publicado 2018
    Electrónico
  5. 545
    Publicado 2014
    “…It is a well-known fact that the weakest link in any secure system is not the system--it is the user. Just ask any hacker. Topics include network security, personal data security, cloud computing, mobile computing, preparing for an incident, incident response, evidence handling, Internet usage, and security certifications. …”
    Libro electrónico
  6. 546
    por Sande, Steve
    Publicado 2010
    “…Unleash your iPhone and take it to the limit using powerful tips and techniques from tech consultant Steve Sande and gadget hacker Erica Sadun. Fast and fun to read, Taking Your iPhone 4 to the Max shows you how to get the most out of Apple's iPhone 4. …”
    Libro electrónico
  7. 547
    Publicado 2017
    “…Al alimentar estas potencias, el activismo comunicativo y hacker cobró enorme relevancia en los albores del nuevo siglo, poniendo en escena formas de hacer que rompen códigos y los moldes de lo establecido. …”
    Libro
  8. 548
    por Ayala, Luis. author
    Publicado 2016
    “…This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. …”
    Libro electrónico
  9. 549
    Publicado 2022
    Libro electrónico
  10. 550
    Publicado 2000
    “…Cada uno de ellos es tratado por un especialista de prestigio internacional en el tema, como John Cottingham, que escribe sobre Descartes; Peter Singer, sobre Hegel; Anthony Kenny, sobre Frege; o Peter Hacker, sobre Wittgenstein, colaboradores todos ellos del equipo responsable de la "Enciclopedia Oxford de filosofía". …”
    Libro
  11. 551
    Publicado 2022
    Tabla de Contenidos: “…More Payloads -- Ransomware as a Service -- Typical Ransomware Process and Components -- Infiltrate -- After Initial Execution -- Dial-Home -- Auto-Update -- Check for Location -- Initial Automatic Payloads -- Waiting -- Hacker Checks C&amp -- C -- More Tools Used -- Reconnaissance -- Readying Encryption -- Data Exfiltration -- Encryption -- Extortion Demand -- Negotiations -- Provide Decryption Keys -- Ransomware Goes Conglomerate -- Ransomware Industry Components -- Summary -- Chapter 2 Preventing Ransomware -- Nineteen Minutes to Takeover -- Good General Computer Defense Strategy -- Understanding How Ransomware Attacks -- The Nine Exploit Methods All Hackers and Malware Use -- Top Root-Cause Exploit Methods of All Hackers and Malware -- Top Root-Cause Exploit Methods of Ransomware -- Preventing Ransomware -- Primary Defenses -- Everything Else -- Use Application Control -- Antivirus Prevention -- Secure Configurations -- Privileged Account Management -- Security Boundary Segmentation -- Data Protection -- Block USB Keys -- Implement a Foreign Russian Language -- Beyond Self-Defense -- Geopolitical Solutions -- International Cooperation and Law Enforcement -- Coordinated Technical Defense -- Disrupt Money Supply…”
    Libro electrónico
  12. 552
    Publicado 2025
    Tabla de Contenidos: “…-- The Erosion of Trust, the Liar's Dividend, and the Need for Action -- Takeaways -- Chapter 3 The Mindset and Tools of a Digital Manipulator: Whispers from the Static -- How Hackers Approach Technology and Problem Solving -- A Hacker's Mind: Two Examples -- Deceptionology 101: Introduction to the Dark Arts -- Thinking, Fast and Slow -- Cognitive Biases: Our Mental Shortcuts -- We've Been Framed -- Example: Framing in a Medical Context -- Example: Framing in Magic…”
    Libro electrónico
  13. 553
    Publicado 2005
    Tabla de Contenidos: “…; MacPaint Evolution; part 4; Steve Wozniak University; The Mythical Man-Year; 1984; Monkey Lives; Puzzle; We're Not Hackers!; A Rich Neighbor Named Xerox; PRICE FIGHT; 90 Hours a Week and loving it; MacPaint Gallery; Steve Capps Day; A Mac for Mick; Real Artists Ship; Disk Swapper's Elbow; It Sure Is Great to Get Out of That Bag!…”
    Libro electrónico
  14. 554
    por Hoffman, Daniel 1972-
    Publicado 2008
    Tabla de Contenidos: “…Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control; About the Author; Credits; Contents; Acknowledgments; Introduction; An Ethical Hacker's Perspective; Misconceptions Abound; The Flow of This Book; What You'll Learn; Questions to Ask Yourself as You Read This Book; Chapter 1: Understanding Terms and Technologies; Who Is the Trusted Computing Group?…”
    Libro electrónico
  15. 555
    por Stevens, Chris
    Publicado 2011
    Tabla de Contenidos: “…WHAT APPLE LEARNED FROM THE FIRST SUCCESSFUL APPSA RENAISSANCE IN GAMING; SUMMARY; CHAPTER 4: THE GOLD RUSH; A TASTE OF SUCCESS; FEELING THE APPILLIONAIRE BUZZ; THE FALLACY OF EASY MONEY; SUMMARY; CHAPTER 5:THE FIRST MILLION; A BOX OF DELIGHTS; THE BOY GENIUS; THE HACKER ARMY GROWS; APPS INVADE BY STEALTH; THE BEDROOM PROGRAMMER AWAKES; SUMMARY; PART II: THE APPILLIONAIRES; CHAPTER 6: DOODLE JUMP; CROATIAN DREAMS; BUBBLEWRAP; IF AT FIRST YOU DON'T SUCCEED . . .; TIC TAC TOE; A HAND-BUILT LOOK AND FEEL; DOODLE JUMP IS BORN; DOODLE JUMP 2 IS BORN; HOW DOODLE JUMP CHANGED THEIR LIVES; SUMMARY…”
    Libro electrónico
  16. 556
    Publicado 2022
    Tabla de Contenidos: “…Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. …”
    Libro electrónico
  17. 557
    Publicado 2018
    Tabla de Contenidos: “…-- Secure design -- Summary -- Questions -- Further reading -- Chapter 8: Secure Coding Best Practices -- Secure coding industry best practices -- Establishing secure coding baselines -- Secure coding awareness training -- Tool evaluation -- Tool optimization -- High-risk module review -- Manual code review tools -- Secure code scanning tools -- Secure compiling -- Common issues in practice -- Summary -- Questions -- Further reading -- Chapter 9: Case Study - Security and Privacy by Design -- Case study background -- Secure architecture review -- Authentication -- Authorization -- Session management -- Data input/output -- Privacy by design -- Summary of security and privacy frameworks -- Third-party component management -- Summary -- Questions -- Further reading -- Chapter 10: Security-Testing Plan and Practices -- Security-testing knowledge kit -- Security-testing plan templates -- Security-testing objective -- Security-testing baseline -- Security-testing environment -- Testing strategy -- High-risk modules -- Recommended security-testing tools -- Web security testing -- Privacy -- Security-testing domains -- Thinking like a hacker -- Exploits and CVE -- Hacker techniques -- Malware Information -- Security-Training environment -- Summary -- Questions -- Further reading -- Chapter 11: Whitebox Testing Tips -- Whitebox review preparation -- Viewing the whole project -- High-risk module -- Whitebox review checklist -- Top common issues -- Secure coding patterns and keywords -- Case study - Java struts security review -- Struts security review approaches -- Struts security checklist -- Struts security strings search in struts.xml and API -- Summary -- Questions -- Further reading…”
    Libro electrónico
  18. 558
  19. 559
    por Osborn, Steven. author
    Publicado 2013
    “…What do you get when you combine an electronics hobbyist, hacker, garage mechanic, kitchen table inventor, tinkerer, and entrepreneur? …”
    Libro electrónico
  20. 560
    Publicado 2013
    “…If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. …”
    Libro electrónico