Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 249
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 47
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Electronic data processing personnel 24
- Computer hackers 23
- Computers 22
- Development 22
- Application software 20
- Wittgenstein, Ludwig 20
- Historia 19
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
-
561por Humphrey, Watts S., 1927-“…By mastering PSP techniques early in their studies, students can avoid--or overcome--the popular "hacker" ethic that leads to so many bad habits. Employers will appreciate new hires prepared to do competent professional work without, as now is common, expensive retraining and years of experience…”
Publicado 1997
Libro electrónico -
562Publicado 2002“…The book documents Stallman's personal evolution from teenage misfit to prescient adult hacker to political leader and examines how that evolution has shaped the free software movement. …”
Libro electrónico -
563Publicado 2024“…MySQL for Data Engineering Learning Linux Hacker Style Coding Description: Extract MySQL data through queries and bash pipelines Dump query results to CSV files. …”
Video -
564Publicado 2010“…In this volume Frank Cioffi, Peter Hacker, Ian Hacking, Roy Harris, Lars Hertzberg, Jaakko Hintikka, Marie McGinn, Danièle Moyal-Sharrock, Hans Sluga among others provide substantial contributions on various aspects of Wittgenstein’s writings such as the philosophy of mathematics, the problem of rule following or the relation between meaning and use…”
Libro -
565por Spadaro, AntonioTabla de Contenidos: “…; LA APERTURA DE UNA «ISLA DE SENTIDO»; AUTORIDAD, JERARQUÍA E INTERNET; LOS CONTENIDOS PASAN POR LAS RELACIONES; 4. ÉTICA HACKER Y VISIÓN CRISTIANA; ¿QUIÉNES SON LOS HACKERS?…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de Pastoral Madrid, Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
566por Cross, Michael, 1965-Tabla de Contenidos: “…Determining Who Will Fight CybercrimeEducating Cybercrime Fighters; Getting Creative in the Fight against Cybercrime; Summary; Frequently Asked Questions; Chapter 2: The Evolution of Cybercrime; Introduction; Exploring Criminality in the Days of Stand-Alone Computers; Sharing More Than Time; The Evolution of a Word; Understanding Early Phreakers, Hackers, and Crackers; Hacking Ma Bell's Phone Network; Living on the LAN: Early Computer Network Hackers; How BBSes Fostered Criminal Behavior; How Online Services Made Cybercrime Easy; Introducing the ARPANET: The Wild West of Networking…”
Publicado 2008
Libro electrónico -
567Publicado 2006Tabla de Contenidos: “…Solidaridad virtualizada y virtualizante. El movimiento hacker y la sociedad de la informaciónCapítulo VII. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
568Publicado 2015“…Assemble a wireless attack toolkit and master the hacker’s weapons Effectively scan and enumerate WiFi networks and client devices Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite Develop and launch client-side attacks using Ettercap and the WiFi Pineapple Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS Exploit holes in WPA and WPA2 personal and enterprise security schemes Leverage rogue hotspots to deliver remote access software through fraudulent software updates Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic Capture and evaluate proprietary wireless technology with Software Defined Radio tools Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices Attack remote wireless networks using compromised Windows systems and built-in tools…”
Libro electrónico -
569Publicado 2024“…Beltrán shows how these hackers apply concepts from the code worlds to their lived experiences, deploying batches, loose coupling, iterative processing (looping), hacking, prototyping, and full-stack development in their daily social interactions—at home, in the workplace, on the dating scene, and in their understanding of the economy, culture, and geopolitics. …”
Grabación no musical -
570Publicado 2023“…It is also an essential resource to study for a variety of cybersecurity certifications, including Certified Ethical Hacker (CEH), CompTIA PenTest+, CEH Practical, Offensive Security Certified Professional (OSCP), Cisco CCIE Security, or CCNP Security. …”
Video -
571Publicado 2023“…In How I Rob Banks: And Other Such Places, renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. …”
Grabación no musical -
572Publicado 2022“…This course can also be a resource for anyone who is preparing for security certification like CompTIA Security+, Cisco CyberOps Associate, CISSP, CompTIA PenTest+, Certified Ethical Hacker (CEH), GIAC certifications, or others…”
Video -
573Publicado 2017“…Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services. …”
Libro electrónico -
574Publicado 2023“…This course is suitable for anyone looking to start their journey or anyone who is looking to get a security certification such as CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), and GIAC Information. Omar Santos takes you on a deep dive into Cybersecurity fundamentals with a training full of demos and real-world examples that allow you to test your skills in a practical scenario. …”
Video -
575Publicado 2008“…“Connectivity has sharply increased the need for secure, hacker-safe applications. By combining this CERT standard with other safety guidelines, customers gain all-round protection and approach the goal of zero-defect software.” …”
Libro electrónico -
576Publicado 2015“…The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. …”
Libro electrónico -
577Publicado 2018“…These web applications can provide hackers with the entry points they use to attack internal business systems, allowing the possibility of data theft or corruption. …”
Video -
578Publicado 2022“…About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Learn how to beat the security of custom websites having specific vulnerabilities In Detail In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. …”
Video -
579Publicado 2022“…In addition to this, you will learn how white hat hackers secure Windows OS by analyzing the malicious files and detecting the hacker's identity. …”
Video -
580Publicado 2011Tabla de Contenidos: “…The illicit abalone trade in South Africa / Jonny Steinberg -- Toxic exports : despite global treaty, hazardous waste trade continues / Jennifer Clapp -- The stolen forests : inside the covert war on illegal logging / Raffi Khatchadourian -- Blood oil / Sebastian Junger -- New organizations. Inside the global hacker service economy / Scott Berinato -- Illicit money : can it be stopped? …”
Libro