Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
541por Sun, Yiyi. author“…Following examples of various apps, such as the counter app, to-do app, weather app, hacker news reader app, and blog app, you will have all the techniques for developing your AppRun apps including the line of business apps. …”
Publicado 2019
Libro electrónico -
542Publicado 2003Tabla de Contenidos: “…/ José Galindo Gómez -- Percepciones en Catalunya de las repercusiones de la IG: apunte de un debate ético / José Antonio Román Brugnoli y Joan Pujol Tarrés -- Ética Hacker y empresa: el reto de las TIC en los valores de empresa / Ramón Alcoberro -- L'ètica de les xarxes de telecomunicacions per cable i de banda ampla / Joan Francesc Fondevila i Gascón -- Acoso moral: ahogados en el trabajo / M. …”
991009658840106719 -
543Publicado 2017“…If you’re just getting started with Perl, this is the book you want—whether you’re a programmer, system administrator, or web hacker. Nicknamed "the Llama" by two generations of users, this bestseller closely follows the popular introductory Perl course taught by the authors since 1991. …”
Libro electrónico -
544
-
545Publicado 2014“…It is a well-known fact that the weakest link in any secure system is not the system--it is the user. Just ask any hacker. Topics include network security, personal data security, cloud computing, mobile computing, preparing for an incident, incident response, evidence handling, Internet usage, and security certifications. …”
Libro electrónico -
546por Sande, Steve“…Unleash your iPhone and take it to the limit using powerful tips and techniques from tech consultant Steve Sande and gadget hacker Erica Sadun. Fast and fun to read, Taking Your iPhone 4 to the Max shows you how to get the most out of Apple's iPhone 4. …”
Publicado 2010
Libro electrónico -
547Publicado 2017“…Al alimentar estas potencias, el activismo comunicativo y hacker cobró enorme relevancia en los albores del nuevo siglo, poniendo en escena formas de hacer que rompen códigos y los moldes de lo establecido. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro -
548por Ayala, Luis. author“…This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. …”
Publicado 2016
Libro electrónico -
549
-
550Publicado 2000“…Cada uno de ellos es tratado por un especialista de prestigio internacional en el tema, como John Cottingham, que escribe sobre Descartes; Peter Singer, sobre Hegel; Anthony Kenny, sobre Frege; o Peter Hacker, sobre Wittgenstein, colaboradores todos ellos del equipo responsable de la "Enciclopedia Oxford de filosofía". …”
Biblioteca del Instituto Superior de Teología de las Islas Canarias (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad de Deusto, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Universidad Loyola - Universidad Loyola Granada)Libro -
551Publicado 2022Tabla de Contenidos: “…More Payloads -- Ransomware as a Service -- Typical Ransomware Process and Components -- Infiltrate -- After Initial Execution -- Dial-Home -- Auto-Update -- Check for Location -- Initial Automatic Payloads -- Waiting -- Hacker Checks C& -- C -- More Tools Used -- Reconnaissance -- Readying Encryption -- Data Exfiltration -- Encryption -- Extortion Demand -- Negotiations -- Provide Decryption Keys -- Ransomware Goes Conglomerate -- Ransomware Industry Components -- Summary -- Chapter 2 Preventing Ransomware -- Nineteen Minutes to Takeover -- Good General Computer Defense Strategy -- Understanding How Ransomware Attacks -- The Nine Exploit Methods All Hackers and Malware Use -- Top Root-Cause Exploit Methods of All Hackers and Malware -- Top Root-Cause Exploit Methods of Ransomware -- Preventing Ransomware -- Primary Defenses -- Everything Else -- Use Application Control -- Antivirus Prevention -- Secure Configurations -- Privileged Account Management -- Security Boundary Segmentation -- Data Protection -- Block USB Keys -- Implement a Foreign Russian Language -- Beyond Self-Defense -- Geopolitical Solutions -- International Cooperation and Law Enforcement -- Coordinated Technical Defense -- Disrupt Money Supply…”
Libro electrónico -
552Publicado 2025Tabla de Contenidos: “…-- The Erosion of Trust, the Liar's Dividend, and the Need for Action -- Takeaways -- Chapter 3 The Mindset and Tools of a Digital Manipulator: Whispers from the Static -- How Hackers Approach Technology and Problem Solving -- A Hacker's Mind: Two Examples -- Deceptionology 101: Introduction to the Dark Arts -- Thinking, Fast and Slow -- Cognitive Biases: Our Mental Shortcuts -- We've Been Framed -- Example: Framing in a Medical Context -- Example: Framing in Magic…”
Libro electrónico -
553Publicado 2005Tabla de Contenidos: “…; MacPaint Evolution; part 4; Steve Wozniak University; The Mythical Man-Year; 1984; Monkey Lives; Puzzle; We're Not Hackers!; A Rich Neighbor Named Xerox; PRICE FIGHT; 90 Hours a Week and loving it; MacPaint Gallery; Steve Capps Day; A Mac for Mick; Real Artists Ship; Disk Swapper's Elbow; It Sure Is Great to Get Out of That Bag!…”
Libro electrónico -
554por Hoffman, Daniel 1972-Tabla de Contenidos: “…Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control; About the Author; Credits; Contents; Acknowledgments; Introduction; An Ethical Hacker's Perspective; Misconceptions Abound; The Flow of This Book; What You'll Learn; Questions to Ask Yourself as You Read This Book; Chapter 1: Understanding Terms and Technologies; Who Is the Trusted Computing Group?…”
Publicado 2008
Libro electrónico -
555por Stevens, ChrisTabla de Contenidos: “…WHAT APPLE LEARNED FROM THE FIRST SUCCESSFUL APPSA RENAISSANCE IN GAMING; SUMMARY; CHAPTER 4: THE GOLD RUSH; A TASTE OF SUCCESS; FEELING THE APPILLIONAIRE BUZZ; THE FALLACY OF EASY MONEY; SUMMARY; CHAPTER 5:THE FIRST MILLION; A BOX OF DELIGHTS; THE BOY GENIUS; THE HACKER ARMY GROWS; APPS INVADE BY STEALTH; THE BEDROOM PROGRAMMER AWAKES; SUMMARY; PART II: THE APPILLIONAIRES; CHAPTER 6: DOODLE JUMP; CROATIAN DREAMS; BUBBLEWRAP; IF AT FIRST YOU DON'T SUCCEED . . .; TIC TAC TOE; A HAND-BUILT LOOK AND FEEL; DOODLE JUMP IS BORN; DOODLE JUMP 2 IS BORN; HOW DOODLE JUMP CHANGED THEIR LIVES; SUMMARY…”
Publicado 2011
Libro electrónico -
556Publicado 2022Tabla de Contenidos: “…Cybersecurity Claims Under Non-Cyber Coverage -- 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance -- Negligent Cybersecurity and Liability for Data Breaches -- Zurich v. …”
Libro electrónico -
557Publicado 2018Tabla de Contenidos: “…-- Secure design -- Summary -- Questions -- Further reading -- Chapter 8: Secure Coding Best Practices -- Secure coding industry best practices -- Establishing secure coding baselines -- Secure coding awareness training -- Tool evaluation -- Tool optimization -- High-risk module review -- Manual code review tools -- Secure code scanning tools -- Secure compiling -- Common issues in practice -- Summary -- Questions -- Further reading -- Chapter 9: Case Study - Security and Privacy by Design -- Case study background -- Secure architecture review -- Authentication -- Authorization -- Session management -- Data input/output -- Privacy by design -- Summary of security and privacy frameworks -- Third-party component management -- Summary -- Questions -- Further reading -- Chapter 10: Security-Testing Plan and Practices -- Security-testing knowledge kit -- Security-testing plan templates -- Security-testing objective -- Security-testing baseline -- Security-testing environment -- Testing strategy -- High-risk modules -- Recommended security-testing tools -- Web security testing -- Privacy -- Security-testing domains -- Thinking like a hacker -- Exploits and CVE -- Hacker techniques -- Malware Information -- Security-Training environment -- Summary -- Questions -- Further reading -- Chapter 11: Whitebox Testing Tips -- Whitebox review preparation -- Viewing the whole project -- High-risk module -- Whitebox review checklist -- Top common issues -- Secure coding patterns and keywords -- Case study - Java struts security review -- Struts security review approaches -- Struts security checklist -- Struts security strings search in struts.xml and API -- Summary -- Questions -- Further reading…”
Libro electrónico -
558
-
559por Osborn, Steven. author“…What do you get when you combine an electronics hobbyist, hacker, garage mechanic, kitchen table inventor, tinkerer, and entrepreneur? …”
Publicado 2013
Libro electrónico -
560Publicado 2013“…If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. …”
Libro electrónico