Mostrando 561 - 580 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.07s Limitar resultados
  1. 561
    por Humphrey, Watts S., 1927-
    Publicado 1997
    “…By mastering PSP techniques early in their studies, students can avoid--or overcome--the popular "hacker" ethic that leads to so many bad habits. Employers will appreciate new hires prepared to do competent professional work without, as now is common, expensive retraining and years of experience…”
    Libro electrónico
  2. 562
    Publicado 2002
    “…The book documents Stallman's personal evolution from teenage misfit to prescient adult hacker to political leader and examines how that evolution has shaped the free software movement. …”
    Libro electrónico
  3. 563
    Publicado 2024
    “…MySQL for Data Engineering Learning Linux Hacker Style Coding Description: Extract MySQL data through queries and bash pipelines Dump query results to CSV files. …”
    Video
  4. 564
    Publicado 2010
    “…In this volume Frank Cioffi, Peter Hacker, Ian Hacking, Roy Harris, Lars Hertzberg, Jaakko Hintikka, Marie McGinn, Danièle Moyal-Sharrock, Hans Sluga among others provide substantial contributions on various aspects of Wittgenstein’s writings such as the philosophy of mathematics, the problem of rule following or the relation between meaning and use…”
    Libro
  5. 565
    por Spadaro, Antonio
    Publicado 2014
    Tabla de Contenidos: “…; LA APERTURA DE UNA «ISLA DE SENTIDO»; AUTORIDAD, JERARQUÍA E INTERNET; LOS CONTENIDOS PASAN POR LAS RELACIONES; 4. ÉTICA HACKER Y VISIÓN CRISTIANA; ¿QUIÉNES SON LOS HACKERS?…”
    Libro electrónico
  6. 566
    por Cross, Michael, 1965-
    Publicado 2008
    Tabla de Contenidos: “…Determining Who Will Fight CybercrimeEducating Cybercrime Fighters; Getting Creative in the Fight against Cybercrime; Summary; Frequently Asked Questions; Chapter 2: The Evolution of Cybercrime; Introduction; Exploring Criminality in the Days of Stand-Alone Computers; Sharing More Than Time; The Evolution of a Word; Understanding Early Phreakers, Hackers, and Crackers; Hacking Ma Bell's Phone Network; Living on the LAN: Early Computer Network Hackers; How BBSes Fostered Criminal Behavior; How Online Services Made Cybercrime Easy; Introducing the ARPANET: The Wild West of Networking…”
    Libro electrónico
  7. 567
    Publicado 2006
    Tabla de Contenidos: “…Solidaridad virtualizada y virtualizante. El movimiento hacker y la sociedad de la informaciónCapítulo VII. …”
    Libro electrónico
  8. 568
    Publicado 2015
    “…Assemble a wireless attack toolkit and master the hacker’s weapons Effectively scan and enumerate WiFi networks and client devices Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite Develop and launch client-side attacks using Ettercap and the WiFi Pineapple Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS Exploit holes in WPA and WPA2 personal and enterprise security schemes Leverage rogue hotspots to deliver remote access software through fraudulent software updates Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic Capture and evaluate proprietary wireless technology with Software Defined Radio tools Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices Attack remote wireless networks using compromised Windows systems and built-in tools…”
    Libro electrónico
  9. 569
    Publicado 2024
    “…Beltrán shows how these hackers apply concepts from the code worlds to their lived experiences, deploying batches, loose coupling, iterative processing (looping), hacking, prototyping, and full-stack development in their daily social interactions—at home, in the workplace, on the dating scene, and in their understanding of the economy, culture, and geopolitics. …”
    Grabación no musical
  10. 570
    Publicado 2023
    “…It is also an essential resource to study for a variety of cybersecurity certifications, including Certified Ethical Hacker (CEH), CompTIA PenTest+, CEH Practical, Offensive Security Certified Professional (OSCP), Cisco CCIE Security, or CCNP Security. …”
    Video
  11. 571
    Publicado 2023
    “…In How I Rob Banks: And Other Such Places, renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. …”
    Grabación no musical
  12. 572
    Publicado 2022
    “…This course can also be a resource for anyone who is preparing for security certification like CompTIA Security+, Cisco CyberOps Associate, CISSP, CompTIA PenTest+, Certified Ethical Hacker (CEH), GIAC certifications, or others…”
    Video
  13. 573
    Publicado 2017
    “…Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services. …”
    Libro electrónico
  14. 574
    Publicado 2023
    “…This course is suitable for anyone looking to start their journey or anyone who is looking to get a security certification such as CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), and GIAC Information. Omar Santos takes you on a deep dive into Cybersecurity fundamentals with a training full of demos and real-world examples that allow you to test your skills in a practical scenario. …”
    Video
  15. 575
    Publicado 2008
    “…“Connectivity has sharply increased the need for secure, hacker-safe applications. By combining this CERT standard with other safety guidelines, customers gain all-round protection and approach the goal of zero-defect software.” …”
    Libro electrónico
  16. 576
    Publicado 2015
    “…The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. …”
    Libro electrónico
  17. 577
    Publicado 2018
    “…These web applications can provide hackers with the entry points they use to attack internal business systems, allowing the possibility of data theft or corruption. …”
    Video
  18. 578
    Publicado 2022
    “…About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Learn how to beat the security of custom websites having specific vulnerabilities In Detail In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. …”
    Video
  19. 579
    Publicado 2022
    “…In addition to this, you will learn how white hat hackers secure Windows OS by analyzing the malicious files and detecting the hacker's identity. …”
    Video
  20. 580
    Publicado 2011
    Tabla de Contenidos: “…The illicit abalone trade in South Africa / Jonny Steinberg -- Toxic exports : despite global treaty, hazardous waste trade continues / Jennifer Clapp -- The stolen forests : inside the covert war on illegal logging / Raffi Khatchadourian -- Blood oil / Sebastian Junger -- New organizations. Inside the global hacker service economy / Scott Berinato -- Illicit money : can it be stopped? …”
    Libro